article thumbnail

Cyber Risk & Your Supply Chain: Managing the Growing Threat

NexusTek

The National Institute of Standards and Technology (NIST) suggests that supply chain risk management involves “identifying susceptibilities, vulnerabilities, and threats throughout the supply chain and developing mitigation strategies to combat those threats” 3.

article thumbnail

Guest Post: Building the “Air Domain” Into Your Security Program

Security Industry Association

That framework consists of six major steps: Conduct a drone vulnerability and risk assessment (DVRA): The DVRA framework is a process that identifies the threat, accounts for critical assets, determines vulnerabilities to those assets and then offers responsible and proportionate risk mitigation recommendations.

Security 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Amplifying School Security With Gunshot Detection Systems

Security Industry Association

Nearly 60% of active shooter incidents at educational institutions since Columbine in 1999 have occurred in high schools, and about 21% have occurred in middle schools or junior high schools. At Virginia Tech in 2007, an active shooter managed to go undetected for two and a half hours after his first two shots were fired in a dormitory.

article thumbnail

How to Navigate the Cybersecurity Minefield of Remote Work

LogisManager

According to an INTERPOL report , between January and April 2020, there was a significant increase in malicious cyber activities attributed to the pandemic shift to WFH. It’s crucial for companies to continuously evaluate and improve their cybersecurity strategies to mitigate risks and comply with legal and regulatory requirements.

article thumbnail

Implementing the “Air Domain” Into your Security Program: A Framework to Consider

Security Industry Association

This may sound counterintuitive, but preparing internal and external stakeholders methodically through a series of substantive actions will support the concept of assessment, technical data gathering for informed decision making, emergency response planning, training/rehearsing/exercising and executing a sUAS left-of-launch operational posture.

article thumbnail

Make Rapid-Fire Reporting Standards Work for You

FS-ISAC

Specified goals vary by jurisdiction, but the main aims are to be able to leverage public sector resources in mitigation and attribution, as well as to encourage more robust operational resiliency. There are several steps financial institutions can take to improve response time and ensure readiness when a crisis strikes.

article thumbnail

How to Navigate the Cybersecurity Minefield of Remote Work

LogisManager

According to an INTERPOL report , between January and April 2020, there was a significant increase in malicious cyber activities attributed to the pandemic shift to WFH. It’s crucial for companies to continuously evaluate and improve their cybersecurity strategies to mitigate risks and comply with legal and regulatory requirements.