Webinar Recording | Cybersecurity in Construction & Real Estate

​Learn effective strategies needed to mitigate your financial and IT risks to address the sophisticated ransomware and social engineering attacks facing businesses today.

How to Create a Comprehensive SSP and Calculate Your SPRS Score: Steps to Confident CMMC Compliance

Navigating CMMC requirements can be daunting, especially when it comes to developing a comprehensive System Security Plan (SSP) and calculating your Supplier Performance Risk System (SPRS) score. Learn how you can confidently complete the necessary steps to compliance, including performing a self-assessment against the NIST SP 800-171r2 controls to develop a robust SSP and SPRS score.

2024-09-03T12:59:04-04:00September 3, 2024|Categories: Risk Advisory|Tags: |

AI in Real Estate: Balancing Innovation and Risks

AI is reshaping the real estate industry, offering unprecedented efficiency and precision. However, while AI brings significant opportunities, it also introduces challenges that must be carefully managed.

2024-09-03T12:36:56-04:00September 3, 2024|Categories: Construction and Real Estate, Cybersecurity, Risk Advisory|Tags: , |

AI in Construction: Navigating the Balance Between Risks and Rewards

AI offers incredible opportunities for the construction industry, but it also brings challenges that require careful management. By thoroughly evaluating the risks and rewards, construction companies can unlock AI’s full potential, driving unprecedented innovation and growth in their projects.

2024-08-28T09:04:00-04:00August 26, 2024|Categories: Construction and Real Estate|Tags: , |

Foreign Companies Expanding into the United States: Navigating Cybersecurity Compliance

Foreign companies entering the U.S. market should understand the SOC 2 and PCI DSS cybersecurity standards. Learn more about why they are what is required to stay complaint.

2024-08-13T12:06:27-04:00August 13, 2024|Categories: Risk Advisory, Cybersecurity, Tax: International|Tags: , |

Red Flags in Your Cyber Insurance Policy: What Non-Profits Need to Know

Many non-profit organizations find themselves facing challenges when it comes to understanding and navigating their cyber insurance policies. Here are some key red flags in your cyber insurance policy that non-profits need to watch for to ensure they are adequately protected.

2024-07-25T08:31:06-04:00July 24, 2024|Categories: Not-for-Profit, Risk Advisory|Tags: , |

Top 5 Lessons Learned from the Microsoft Outages Caused by a CrowdStrike Software Glitch

The recent global Microsoft outages attributed to a CrowdStrike software glitch have highlighted significant vulnerabilities in our interconnected digital ecosystem. Learn about the key lessons learned to help organizations enhance their resilience.

2024-07-22T09:51:21-04:00July 22, 2024|Categories: Cybersecurity, Risk Advisory|Tags: |

Navigating the Future of Cybersecurity: A Deep Dive into NIST CSF 2.0

The recent release of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 2.0 marks a significant milestone in the evolution of cybersecurity standards. Learn about the key updates in NIST CSF 2.0 and explore how these changes will shape the future of cybersecurity and risk management.

2024-06-23T04:24:02-04:00June 17, 2024|Categories: Risk Advisory, Cybersecurity|Tags: , , , |

Bridging the Compliance Gap: The Unseen Challenge of SOC 2 and PCI DSS

In today's rapidly evolving digital landscape, maintaining robust security and compliance mechanisms is not just a regulatory requirement; it's a business imperative. Two primary frameworks dominate this landscape: SOC 2 and PCI DSS. However, the market presents a unique challenge: the intersection of firms that can proficiently handle both SOC 2 reports and PCI DSS assessments.

2024-06-03T09:00:41-04:00June 7, 2024|Categories: Risk Advisory, Cybersecurity|Tags: , |

Navigating Data Security in Healthcare: Understanding the Distinctions Between HIPAA and HITRUST

Comparing HIPAA and HITRUST is a bit like comparing apples and oranges because they serve different purposes within the realm of healthcare compliance. Understanding their distinctions is essential for any healthcare entity striving to achieve comprehensive data security.

2024-06-03T09:01:03-04:00June 5, 2024|Categories: Healthcare, Risk Advisory|Tags: , |
Go to Top

As Internet Explorer will discontinue browser security updates by August of 2021, this site is best viewed using Google Chrome, Safari or Microsoft Edge.

Click to Continue