Where to start in cybersecurity: partner with an ISO 27001 certified vendor
Evolver’s data security practices confirmed by ISO 27001:2013 certification. Evolver recertifies in ISO 9001:2015 and reappraisal CMMI maturity level 3.
Evolver presents on converged security at ACT-IAC Executive Leadership Conference
Chip Block, Vice President of Evolver will present: The Chief Security Officer: Why Industry Has Converged Physical and Cyber Security and Why Government Should Take Notice. The session is a Ted Talk style discussion that will take audience members through the merging of cyber and physical security into converged security, a holistic approach […]
Evolver partners with Vidsys to offer converged security to clients
Converged security provides holistic approach to risk management The concept of converged security is relatively new to the cyber landscape. This approach combines two historically distinct functions (physical security and information security) within the organization. The implementation of converged security is key to a comprehensive risk management program. Chip Block, Vice President of […]
Successful Matchmaking of NIST 800-63-3 Digital Identity Guidelines and Monetary Risk using the FAIR Standard
Whitepaper on the connection between NIST 800-63-3 Digital Identity Guidelines and the FAIR Analysis for Cyber Risk Quantification.
Find Fake Social Media Profiles with Social Media Security Screening
The new playground for cyber hackers is through social media accounts. Find fake social media profiles and to improve your cybersecurity and risk.
Evolver Participates in the FDA Workshop on Cybersecurity of Medical Devices
Dr. Tim Rudolph, Vice President of Cybersecurity and Chip Block, Vice President are attending the Public Workshop – Cybersecurity of Medical Devices: A Regulatory Science Gap Analysis on May 18-19, 2017. The event is hosted by The Food and Drug Administration (FDA), in association with National Science Foundation (NSF) and Department of Homeland Security, […]
Cyber Executives’ Perspective on WannaCry Attacks
With recent events: WannaCry attacks (WannaCrypt, WannaCryptor) attacks, Evolver cyber executives offer perspective of the current state of cybersecurity.
Evolver Cyber Executives to Speak at ACT-IAC Healthcare Cyber Forum
Focusing on the critical area of cybersecurity as it relates to healthcare, ACT-IAC hosts 2017 Cybersecurity Forum: Prescription for Healthcare Cyber. Speakers will discuss challenges and barriers the health care industry encounters when securing itself against cyber-attacks. Greater understanding and guidance are needed to help the healthcare industry bolster information security and […]
Whitepaper: The Solution to Medical Device Security Could Save Lives
Whitepaper proposing a solution to medical device security by reducing cyber attack surface points through the DocBox technology. Written by Chip Block.
What’s involved in a cyber risk quantification?
Cyber risk quantification identifies assets, understands threat communities, defines the loss event, and determines the financial impact of a data breach. A cyber risk quantification, as with any type of assessment, must start with proper scoping. Specifically to cyber risk quantification, it is essential to clearly establish who, what and how. Who – […]