Evolver presents on converged security at ACT-IAC Executive Leadership Conference

  Chip Block, Vice President of Evolver will present: The Chief Security Officer: Why Industry Has Converged Physical and Cyber Security and Why Government Should Take Notice.   The session is a Ted Talk style discussion that will take audience members through the merging of cyber and physical security into converged security, a holistic approach […]

Evolver partners with Vidsys to offer converged security to clients

Converged security provides holistic approach to risk management     The concept of converged security is relatively new to the cyber landscape.  This approach combines two historically distinct functions (physical security and information security) within the organization.  The implementation of converged security is key to a comprehensive risk management program.  Chip Block, Vice President of […]

Evolver Participates in the FDA Workshop on Cybersecurity of Medical Devices

  Dr. Tim Rudolph, Vice President of Cybersecurity and Chip Block, Vice President are attending the Public Workshop – Cybersecurity of Medical Devices: A Regulatory Science Gap Analysis on May 18-19, 2017. The event is hosted by The Food and Drug Administration (FDA), in association with National Science Foundation (NSF) and Department of Homeland Security, […]

Evolver Cyber Executives to Speak at ACT-IAC Healthcare Cyber Forum

Focusing on the critical area of cybersecurity as it relates to healthcare, ACT-IAC hosts 2017 Cybersecurity Forum: Prescription for Healthcare Cyber.     Speakers will discuss challenges and barriers the health care industry encounters when securing itself against cyber-attacks.   Greater understanding and guidance are needed to help the healthcare industry bolster information security and […]

What’s involved in a cyber risk quantification?

Cyber risk quantification identifies assets, understands threat communities, defines the loss event, and determines the financial impact of a data breach.   A cyber risk quantification, as with any type of assessment, must start with proper scoping.   Specifically to cyber risk quantification, it is essential to clearly establish who, what and how. Who – […]