Skip to main content
FoxPointe FoxPointe
  • Services
    • Compliance
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog
  • Contact Us
FoxPointe
  • Services
    • Compliance
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog

Enter Keywords

  1. Home
  2. Blog
  3. Categories

FoxPointe Security Hub

Risk Management

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

Subscribe Now

The Crucial Role of a CISO and the Power of GRC Tools in Organizational Compliance

August 24, 2023
In today's rapidly evolving digital landscape, the protection of sensitive information and the preservation of digital assets have become paramount, as has a full and accurate understanding of the controls in place.  As organizations navigate the intricate realm of cybersecurity, the role of a…

Interagency Guidance on Risks Associated with Third-Party Relationships

June 23, 2023
Yesterday, the Board of Governors of the Federal Reserve System (Federal Reserve), the Federal Deposit Insurance Corporation (FDIC), and the Office of the Comptroller of the Currency (OCC, and together with the Federal Reserve and the FDIC, the Agencies), finalized previously proposed interagency…

Risks and Difficulties Associated with Multi-Factor Authentication

March 14, 2023
This article was written by Brandon Agostinelli. The Cybersecurity and Infrastructure Security Agency (CISA) defines Multi-factor authentication (MFA) as: “a layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to…

Ransomware Concerns and Risk Mitigation

February 23, 2022
All organizations can face a disastrous outcome to a ransomware event, including the governmental entities. An outbreak is a painful event especially with the critical role these agencies have. The disruption of essential services to the public, health care, water & sewerage, education,…

Benefits of a SOC 2 + HITRUST CSF Report

June 10, 2021
This blog was written and produced by Courtney Nist, Senior Security Consultant CHQP, CCSFP, at FoxPointe Solutions. Looking to get in touch with Courtney? Reach out today: Courtney Nist cnist@foxpointesolutions.com. Based on the Verizon Data Breach Investigations Report of 2021, healthcare and…

Benefits of a SOC 1 Report

May 21, 2021
What is a SOC 1 Report A SOC 1 report, also known as the Statement on Standards for Attestation Engagements (SSAE) 18, focuses on a service organization’s controls that are likely to be relevant to an audit of a user entity’s (customer’s) financial statements. SOC 1 reports cover a…

Reducing Third-Party Risk: Ongoing Assessment and Monitoring

April 15, 2021
In this day and age, the risk of cybersecurity threats is becoming a concerning topic for organizations. Reducing the risk of data breach has become a top priority for many businesses. When it comes to minimizing risk, an often-overlooked area is third-party risk. Many organizations include an…

Measuring the Costs of Cyber Risk; Applying Lean Six Sigma Methodologies for a Customer's First Mindset

March 3, 2021
The year 2020 will be forever remembered for the impacts of how the global pandemic forced the adoption of innovative production, logistics, and workforce solutions. Many best practices emerged from the experiences of COVID-19, we continue to learn that these new methods can pay significant…

The SolarWinds Hack – It’s Time to Change the Way We Think About Cybersecurity

February 4, 2021
With many still reeling from the aftermath of the SolarWinds hack, enough dust has settled that we’ve started to ask the important questions: How did this happen? What can we do to prevent this in the future? And will it happen again? The good news is that this cyber attack is incredibly…

Municipalities: Create Measurable Value through Enterprise Risk Management (ERM) Controls

June 3, 2019
In the wake of the risks surrounding cybersecurity breaches, ever overarching regulatory scrutiny from the Office of the New York State Comptroller and the myriad other state and federal agencies, and the demands of key stakeholders, municipalities are faced with increasing audit and assurance…
  • Topics
  • Authors
  • Data Security (15)
  • Data Privacy (15)
  • Compliance (5)
  • Risk Management (10)
  • Cybersecurity Alert (7)
  • Cybersecurity (27)
  • Archive (34)
  • Charlie Wood | PCI QSA, CISA, CRISC, CISM
  • Carl Cadregari | CISA, CCSFP, CTPRP
  • Brandon Agostinelli
  • Courtney Caryl | CCSFP, CHQP
  • Allison Hall | PCIP, CCSFP
  • Christopher Salone | MBA
  • Grace Walker | CPA, CCSFP, CHQP
Let us show you how we can help
Request Quote
FoxPointe

171 Sully's Trail
Pittsford, NY 14534

Call 844-726-8869
or Contact Us

Subscribe to the Blog

Services
CompliancePenetration TestingGeneral ConsultingIT AuditVirtual Chief Information Security Officer (vCISO)
Company
Management TeamAbout UsBlogCareersPrivacy Policy
©2023 FoxPointe
Website by Corporate Communications, Inc.
We use cookies and other technologies to optimize site functionally, analyze website traffic, and share information with our service and analytics partners. To view our Privacy Policy, which discusses cookies, click here. By continuing to use & browse our services, you agree to our Privacy Policy, our use of cookies, and the Terms and Conditions.