Skip to content

David X Martin

Cyber Risk Management for business leaders
  • Home
  • Why Cybersecurity Matters
  • CyberWellness
  • Books
  • Articles & Media
  • Glossary
  • How I Help
  • About

Media

Cybersecurity Glossary: Security risk assessment

November 30, 2019 David X Martin

A security risk assessment can be performed on any application, function, or process within your organization. The results give you a practical (and cost-effective) plan to protect assets and still maintain a balance of productivity and operational effectiveness.

Continue Reading →

Posted in: Glossary Filed under: business strategy, cyber risk management, risk management

Cybersecurity Glossary: Security policy

David X Martin

An Information Technology (IT) Security Policy identifies the rules and procedures for all individuals accessing and using an organization’s IT assets and resources.

Continue Reading →

Posted in: Glossary Filed under: business strategy, corporate culture

Cybersecurity Glossary: Security Operations Center (SOC)

David X Martin

A security operations center (SOC) is a facility that houses an information security team responsible for monitoring and analyzing an organization’s security posture on an ongoing basis.

Continue Reading →

Posted in: Glossary Filed under: senior management

Cybersecurity Glossary: Security officer (CISO)

David X Martin

The chief information security officer (CISO) is the executive responsible for an organization’s information and data security.

Continue Reading →

Posted in: Glossary Filed under: senior management

Cybersecurity Glossary: Incident response plan

David X Martin

An incident response plan aims to reduce this damage and recover as quickly as possible. Investigation is also a key component in order to learn from the attack and better prepare for the future.

Continue Reading →

Posted in: Glossary Filed under: cyberattack

Cybersecurity Glossary: Intrusion Prevention System (IPS)

David X Martin

An intrusion prevention system (IPS) provides policies and rules for network traffic to alert a network administrator to suspicious traffic.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, hack

Cybersecurity Glossary: Vulnerabilities

David X Martin

Vulnerabilities are the gates through which threats enter the enterprise. The more applications a company deploys, the more vulnerabilities it creates for itself.

Continue Reading →

Posted in: Glossary Filed under: data breach, hack

Cybersecurity Glossary: Cyber Wellness

November 25, 2019 David X Martin

Most companies’ cybersecurity strategy is reactive – triage to contain damage. The new way forward is to ensure cyber wellness, which is a proactive stance to prevent and respond to attacks.

Continue Reading →

Posted in: Articles by DXM, Glossary Filed under: cyber wellness, glossary

Cybersecurity Glossary: Cybersecurity (cyber security)

David X Martin

Cybersecurity is the practice of defending computers, servers, mobile devices, electronic and operational systems, networks and data from cyber attacks.

Continue Reading →

Posted in: Articles by DXM, Glossary Filed under: cybersecurity

Cybersecurity Glossary: Hacker

November 21, 2019 David X Martin

A hacker is an unauthorized user who breaks into computer systems to steal, change or destroy information, often by installing dangerous malware without the knowledge or consent of the device’s rightful owner or user.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack

Post navigation

Page 4 of 10
← Previous 1 … 3 4 5 … 10 Next →

Latest posts

  • Ransomware: Don’t Expect Governments Alone to Save Us
  • CyRM: Mastering the Management of Cybersecurity Risk, with David X Martin
  • The Future of Risk Management

Get in touch


Contact form

Let’s Connect

  • X
  • LinkedIn

NEW! CyRM: Mastering the Management of Cybersecurity

CyRM Mastering the management of cybersecurity by David X Martin

Introducing CyRM as an approach to growth

CyRM cyberWELlness

Search DavidXMartin.com

#cyberwellness
#cyrmbook
#cybersecurity
#riskmanagement
#cyberriskmanagement

LEARN THE LINGO
Cybersecurity Glossary

Privacy Policy

Your data is protected.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright © David X Martin
Website by MediaMoxie.com