In today's digital age, cybersecurity has become critical for businesses of all sizes. However, companies need to demonstrate evidence of due diligence and due care for cybersecurity operations, which can be daunting without a proper framework. This is where The...
Lynx Blog
Escape Spreadsheet Hell: Transitioning Your GRC Efforts
In many organizations the genesis of their GRC efforts can be traced back to a few isolated projects that were quick responses to external factors (e.g. scrambling to pass the first PCI audit, “What’s this HIPAA thing all about?”, etc.) To get these projects going...
The Cloud 9 of Threats & Solutions
If you’re in business in 2016, your company most likely uses Cloud services of one kind or another. You can’t avoid the Cloud, whether personally or for your business. But with so much empowerment and capability, who wants to avoid it? However, security remains a...
Using the NIST Cyber Security Framework to Build Your IT Risk Program
Creating a robust IT risk management program is critical in every business. It is what will guide your security program, compliance regime, and even the decisions you make in selecting technology or business services. But before you can run, you have to walk. ...
Nostradamus Predicts 2020?
Nostradamus? Not quite... but, UC Berkeley's Center for Long-Term Cybersecurity has produced a set of scenarios - not predictions - that describe future possibilities, exploring how emerging and unknown forces may shape our future. These scenarios...
How To Build Your Risk Management Program Using the NIST CSF
Simply put, risk is the product of probablity times impact. A risk-based security strategy and IT Risk Management Program is created in order to make smart cybersecurity decisions that will enable the business to make the best cyber security investment and staffing...
Cognitive Powers or More Hype for eGRCs?
I recently read an article, "The Transformative Power of Cognitive GRC," from the Open Compliance and Ethics Group (OCEG). The OCEG is a global, nonprofit think tank that claims to have invented GRC, and develops standards and other resources. They have a lot of...
A Financial Services Cyber Security Resource Guide
According to the DTCC, Cyber Security is the number one threat facing our country's financial institutions. We understand that securing the future of financial services is a challenge at best. With the ever-changing technology landscape and the many moving parts, IT...
The Lynx Story Evolution- The path to risk based security partner
Risk is a word well known to entrepreneurs, so it has been a natural evolution from founding Lynx in 2009 to becoming the risk-based security partner we are today. When my co-founders, Gina Mahin and David Elcock, and I took the leap into full-time entrepreneurship to...