Insights

The world of cybersecurity is constantly evolving as new threats and defense methods emerge every day. We stay on top of what is happening in worldwideontribute to the conversation and share what we think is most critical to the industries we serve.

Filter

ComplianceCybersecurity

GRC from the Trenches

  As the pre-dawn mist draped itself over the desolate battlefield, a lone figure lay…
Cybersecurity

Beyond the Checkbox: Building a Cybersecurity Program Customers Actually Love – Tips for Success

Many customers demand transparency, accountability, and proactive measures to protect their data and critical operations…
CybersecuritySSC Podcast

Beyond the Checkbox: Building a Cybersecurity Program Customers Actually Love – Mistakes to Avoid

In today's hyper-connected world and cyber-criminal-laden landscape, cybersecurity is no longer an optional add-on; it's…
Cybersecurity

Humans vs Tools: Prioritizing the Human Factor in Cyber Defense

The cyber battlefield is always evolving, with attackers exploiting new vulnerabilities… and the old ones…
Cybersecurity

Don’t Be Held Hostage: Optimizing Your IT MSP Relationship

Managed Service Providers (MSPs) can be valuable partners, but their offerings might not align with…
Cybersecurity

Virtual/Fractional CISO: More Than a Buzzword/Fad?

Cybercrime impact on business is real. No business leader should think that their business is…
Cybersecurity

Cybersecurity Is Not Best Left to the Experts: A 2024 Business Leader’s Guide 

If you are a senior business leader today, it is becoming much harder to ignore…
Cybersecurity

Big Consulting vs Boutique Firms 

When it comes to unfamiliar or complex challenges, partnering with a consulting firm can be…
CybersecurityLeadership

Proactive Product Security: A Competitive Edge in the 2024 Economy

In the 2024 business landscape, where trust is as valuable as the technology itself, cybersecurity…
CybersecurityLeadership

Bracketology for Your Business: Prioritizing Cybersecurity Projects in a Chaotic World

Many cybersecurity professionals dream of a world with a limited number of threats to address.…
CybersecurityLeadership

Private Equity & The Digital Cyber Minefield – Protecting Portfolio Companies from Cyberattacks

Private equity (PE) firms hold the keys to the growth potential of numerous companies they…
Cybersecurity

10 Tips for Secure Travel During Spring Break: Cybersecurity Edition

Spring Break is that irresistible, sun-soaked hiatus that lulls you into a carefree sense of…
CybersecurityLeadership

Third-Party Cyber Risk: Navigating the Maze in Pharma and Beyond

The pharmaceutical industry, alongside countless others, thrives on collaboration with a network of external vendors.…
CybersecurityLeadership

Top Consulting Pain Points

I’ve led cybersecurity programs at several companies, and since shifting into consulting, I have helped…
CybersecurityLeadership

From Resolutions to Resilience: Keys to Delivering on Your Cybersecurity Program Goals in 2024

Give this post a like or comment if you've ever made a New Year's resolution,…
Cybersecurity

What should CISOs be thinking about in 2024?

I wanted to write a quick post about the topics CISOs should be thinking about…
CybersecurityIndustry Trends

Best Practices for Conducting Cyber Mergers & Acquisitions

Best Practices:  A transaction can be an exciting time for all parties involved.  Amidst all…
Cybersecurity

The Ghost of GRC

On a snowless, sunny Christmas Eve in Indianapolis, a go-getter cyber analyst named Dean Perry…
ComplianceCybersecurity

How to Navigate Cybersecurity Risk, Compliance, and Audit Requirements – For Healthcare Providers

Protecting sensitive personal health information has been a regulatory requirement and a sensitive topic in…
AssessmentsCybersecurity

Under Pressure – Testing Incident Response Plans

Picture This:   It’s December, and you’ve just wrapped up your company-wide security awareness training campaign…
AssessmentsCybersecurity

Program Health Self-Check

Understanding Your Business, Information, Risk, and Threats 1. Do you have an information classification program…
Cybersecurity

Insider Threat Programs

Awareness is Key An effective Insider Threat Program (ITP) is incomplete without an awareness program.…
Cybersecurity

2023 Cyber Community Month

As you’ve seen in some of the posts and podcasts @Cody Rivers and I have…
Cybersecurity

The Curiosity that is the Non-Technical, Non-Security CISO

As someone with a C-level title in a security company, I get lots of marketing…
CybersecurityIndustry Trends

The Past, Present, and Necessary Future of Cybersecurity Workforce Awareness

Many cyber and information security workforce awareness programs are nascent, broken, starved for resourcing, and/or…
Cybersecurity

Cyber Crime Barbie? Why Cyber Criminals and Hackers Focus on Popular Events, Pop Culture and Trends

With the growing popularity of social media, world events, and pop culture, it's no surprise…
Cybersecurity

Tips for Gamer Security

Next time you power up for a game of Fortnite, you may want to take…
Cybersecurity

Cybersecurity: A Costly Annoyance or a Differentiating Competitive Advantage

Are you an executive or work with/for an executive that has accountability for making decisions…
Cybersecurity

Third-Party and Supply Chain Risk Management in Cybersecurity: Bridging the Gap to Enterprise Risk

In today’s interconnected business environment, organizations increasingly rely on third-party vendors, suppliers, service providers, and…
Cybersecurity

Why SMBs Get Bullied by Cyber Criminals and What To Do About It 

Ask almost any kid, "Who gets picked on by the playground bullies?" and there's a…
CybersecurityLeadership

How to Grow Your Leadership Career in Cybersecurity 

If you have made your way to this article, you are either interested in cybersecurity…
Cybersecurity

2023 Tax Scams: The Dirty Dozen

What are this year's biggest tax scams? Take a look at this list of the…
Cybersecurity

Third Party Risk Management

We use a proven method to help you understand and evaluate risk so you can…
Cybersecurity

Cybersecurity in Small and Mid-Size Businesses 

Cybersecurity is a critical and growing concern for businesses of all sizes and industries, but…
Cybersecurity

Cybersecurity Risk Management in Mergers and Acquisitions

Mergers and acquisitions (M&A) are complex and challenging business transactions that can create significant value…
Cybersecurity

Blog: Improving CISO Reporting Structure Challenges and Board Engagement

Are you a CISO or senior leader owning information security who struggles with reporting to…
CybersecurityLeadership

Improving CISO Reporting Structure Challenges and Board Engagement 

Are you a CISO or senior leader owning information security who struggles with reporting to…
Cybersecurity

Reveal Risk is a Mira Award Nominee!

This year, Reveal Risk was nominated for a TechPoint Mira Award (Service Partner of the…
Cybersecurity

Staying Safe During Spring Break

It’s that time of year again, when the college crowds get out of the dorms…
Cybersecurity

10 Tips for Secure Travel

Looking to travel as securely as possible? Our team from #RevealRisk has you covered. Check…
Cybersecurity

Luck Won’t Help You With Cybersecurity

Leaving your cybersecurity strategy to luck, isn't going to cut it. In fact, when it…
Cybersecurity

Understanding and Managing Insider Threats in Cybersecurity

Managing insider threats in cybersecurity is critical to managing overall cyber risk. However, the insider…
Cybersecurity

Romance Scams to Watch Out For

Is it cupid or a catfish? In 2023, it's hard to be sure. What are…
Cybersecurity

2023 Safer Internet Day

How can you keep family, friends, elders, and children safe from the potential dangers that…
CybersecurityLeadership

Making Your Business Fall in Love with Cyber

February usually inspires (Hallmark) visions of romance and love, often depicted mythologically as instigated through…
Cybersecurity

Privacy and Smart Devices

  We are finally getting close to the world of George Jetson. The rosy, utopian…
Cybersecurity

Chat GPT and Cybersecurity

You’ve probably read about OpenAI.org’s Chat GPT. But in case you haven’t, it’s widely considered the…
Compliance

The Pitfalls of Compliance-Focused Cybersecurity Programs

A compliance-driven focus on building a cybersecurity program can be all too common. Why? ·…
Cybersecurity

Does Your Cybersecurity Workforce Awareness Program Matter?

Few cyber professionals would disagree that every person within an organization (employees and the extended…
Cybersecurity

2023 Smartphone Spying

Our smartphones have become indispensable and, as such, attackers are targeting them with increasing frequency…
Cybersecurity

Staying Secure During Holiday Travel

Rental Car Cyber Risks Should you connect your device? The holidays are upon us again,…
Cybersecurity

Understanding Fraud and How to Spot it 

Fraud is an unfortunate reality for every business, large or small. It is not always…
Cybersecurity

Shop Cyber Safe This Holiday Season

Reveal Risk has gifts to share with you for this Cyber Monday and throughout the…
Cybersecurity

How Are Password Resets Used to Hack Your Account

  Are you Iron Man or the Hulk? Have you seen a quiz on social…
Cybersecurity

Motion for the Defense: Raising the Bar for Cyber

They work tirelessly to meet their goals. They handle large sums of money across multiple…
News

New Employee Feature: Wyatt Wunnenberg

Senior Consultant Wyatt Wunnenberg is our newest addition to the Reveal Risk team. Growing up…
Cybersecurity

You Can’t Take it With You: Managing Insider Threat Risk with Departing Employees

So, it's a Friday afternoon at the office, just after lunch. You're wrapping up your…
Cybersecurity

Securing Legacy Systems in the Age of Supply Chain Chaos

Ah, legacy systems. Like wrinkles or a receding hairline, as your company and its IT…
News

New Employee Feature: Jim Wailes

Jim Wailes, a Senior Consultant for Reveal Risk, is full of surprises. Upon meeting him,…
CybersecurityIndustry Trends

Happy National Women’s Day!

National Women's Day serves as a reminder of how far women have come in their…
Cybersecurity

Is Your Business Prepared to Use that Cyber Insurance Policy?

You’ve had a cyber incident, but will your insurance company deny your claim?   When it…
CybersecurityIndustry Trends

INFOGRAPHIC: National Parent’s Day

Click the image below for a better look at how you can keep your parents…
Leadership

Building Senior Leader Engagement in Cyber Security

Way back in January of 2020, before the world knew what was in store for…
Leadership

One Byte at a Time: A Business Risk-Based Approach to Cybersecurity

Senior leaders with the ultimate accountability for cybersecurity inherently leverage some form of risk management,…
Cybersecurity

INFOGRAPHIC: Cyberbullying – What Parents Should Look Out For

Want to know the signs that your child is being cyberbullied, or whether they're the…
CybersecurityLeadership

Corporate vs Consulting: Reveal Risk… and YOU

As a student at Indiana University business school, I remember going to several industry-sponsored panels…
Cybersecurity

RR Cyber Madness Bracket Update – Championship Round and Winner Reveal

Welcome to Reveal Risk's first annual Cyber Madness! In the spirit of March Madness, we…
CybersecurityLeadership

The Importance of People Skills Within Cybersecurity

One of the things I learned the hard way in my cybersecurity career is that…
CybersecurityLeadership

Internet Privacy: Fact or Fiction?

It’s no surprise that our society is speeding down a path of widespread digitization. In…
Leadership

Privacy vs. Security – Why Can’t We All Just Get Along? Top 5 Approaches to Yin/Yang Privacy & Security

Written by Aaron Pritz The average employee not working in an IS/Privacy role may hear…
Leadership

New Employee Feature: Chris Adickes

Chris Adickes, one of Reveal Risk’s newest additions, provides more than just his expertise to…
CybersecurityIndustry Trends

Cybersecurity Goals You Should be Setting

As we wrap up 2021, you may wonder what your New Year’s resolution should be.…
Industry Trends

2022 Cyber Trends to Look Forward To

It’s incredible how much a virus can rock the foundation of the entire globe, leaving…
Cybersecurity

New Employee Feature: Idriss Bah

Idriss Bah is a new member of the Reveal Risk team. His passion for cyber…
CybersecurityIndustry Trends

Can Your Wi-Fi Securely Handle Your Electronic Holiday Gifts?

Routers 101 – A Guide for Non-Experts!  It's that time of year when we risk…
Cybersecurity

Culture Beyond the U.S.

I’ve hardly ever heard of a time where Americans had more trust in one another…
Leadership

Happy Veterans Day!

Veterans Day is a very important holiday at Reveal Risk. We recognize that this day…
Leadership

An Interview with Tim Sewell

Author: Gizzelle Sandoval (more…)
Cybersecurity

How to Test Your Security

Here are 8 questions to ask yourself to determine how your cybersecurity stacks up at…
Industry Trends

Pharmaceutical Trends In Cyber

In the pharmaceutical industry? You're in luck! We’ve created a list of pharmaceutical trends in…
CybersecurityLeadershipNews

Reveal Risk Featured in WISH TV Segment on Ransomware

View original article from WISH-TV here INDIANAPOLIS (WISH) — While big corporations may get the…
Industry Trends

Healthcare Trends In Cybersecurity

Cyber attacks on healthcare facilities in the U.S. this year alone have affected 17.3 million…
Cybersecurity

Back to “The Office” – Wherever that is!

Back to "The Office" - Wherever that is! According to Global Workplace Analytics, 25-30% of…
Cybersecurity

St Patrick’s Day: Luck and Cybersecurity Risk

Happy St Patricks Day! “Luck” should only be your focus one day a year. 🍀…
CybersecurityLeadership

The Cybersecurity Final Four

Author: Aaron Pritz, CEO, Co-Founder - Reveal Risk Sales people every where just clicked on…
CybersecurityLeadership

What you need to know about a data breach: a legal and cybersecurity perspective

The legal ramifications of a cyber-attack or data breach are important for companies to understand.…
CybersecurityLeadership

6 Big Cyber Risks for 2021

Finally, hindsight is truly 2020. After the year that wasn’t, we have an opportunity to…
CybersecurityLeadership

Raising Trust In Security And Privacy In A Distracted World

View original article on Forbes here Author: Aaron Pritz, CEO, Co-Founder - Reveal Risk In…
CybersecurityLeadership

Cybersecurity Is Not Best Left To The Experts: A Business Leader’s Guide

View original article published on Forbes here If you are a senior business leader today,…
CybersecurityLeadership

Forbes: The Five-Step Recipe For Avoiding Insider Threat Disasters

View original article published on Forbes here. Author: Aaron Pritz, CEO, Co-Founder - Reveal Risk…
Cybersecurity

Forbes: The Threat Within: Understanding And Driving Effective Insider Threat Programs

View the original Forbes article here. Author: Aaron Pritz, CEO, Co-Founder - Reveal Risk Insider…
Leadership

Hackers pounce as coronavirus spread triggers work-at-home movement – an IBJ Article

Direct IBJ Article Link - by Anthony Schoettle (featuring Aaron Pritz and Tim Sewell) As…
Cybersecurity

Securing Simplicity

Securing Simplicity Those who get breached with the most tools... are still pwned.  Author: Tim…
CybersecurityLeadershipNews

Cybersecurity firm Reveal Risk introduces advisory board members

CARMEL, Ind. (June 25, 2020) – Carmel-based Reveal Risk recently formed an advisory board comprised…
Industry Trends

Internet Safety for Kids

Keep your children safe online. Here are 6 tips on how to do just that!…
Industry Trends

Don’t Fall for the Bait!

Avoid Social Engineering and Phishing Attacks. Let us help you! Enjoy our tips in this…
Industry Trends

Information Security Statistics Every Business Should Know

Phishing is almost as old as the internet itself, yet it's still one of the…
CMMCCybersecurity

CMMC – Staying Ahead of the Bow Wave

CMMC - Staying Ahead of the Bow Wave Written by: Aaron West A bow wave…
Cybersecurity

Don’t Put All Your Data In One “Basket”

Written by: Aaron West If you’ve got a child who’s going on an Easter egg…
Industry Trends

Remote-Virtual Work Cyber Security Health Check

I was at home Saturday morning thinking about a good friend who is stuck in…
Industry Trends

Staying “Cyber Safe” Infographic

We created this infographic to help employees and beyond stay “cyber safe” as the world…
Industry Trends

Password Do’s and Don’ts

Here are a few tips for creating strong passwords. Take a moment to review these,…
Cybersecurity

Protecting Your Electronic “Toys”

Protecting Your Electronic “Toys” Author: Aaron West Did you get a new Internet connected /…
Cybersecurity

Top Five Cybersecurity Focus Areas for 2020

Top Five Cybersecurity Trends for 2020 Happy New Year!  Have you noticed that December and…
Leadership

The CxO Business Executive and Security Leadership’s Guide to Cyber Security Harmony

The CxO Business Executive and Security Leadership’s Guide to Cyber Security Harmony By: Aaron Pritz–CEO…
Cybersecurity

Thankful Lessons from a life in Cyber

As we come into the Thanksgiving holiday, I was reflecting on the things I’m thankful…
News

Reveal Risk Celebrates 1 Year & Opening of New Office

Reveal Risk Celebrates 1 Year & Opening of New Office CARMEL, Ind. – Recognizing the…
Cybersecurity

Deep Sea Phishing: A Taxonomy For Email Cyber Threats

Email threats have become a persistent source of cyber security practitioner anguish.  However, a lack…
Cybersecurity

Survival Of The Fittest: Is Incident Response

Author: Aaron Pritz– CEO, Principal Consultant, Co-Founder at Reveal Risk How many of your cyber security programs…
CybersecurityLeadership

A Cloud Security Primer – “How To Move From Security Concerns To Security Empowered”

“How to move from security concerns to security empowered”  It’s the new reality for business: the question enterprises…
CybersecurityLeadership

“Measure twice, cut once” – and other practical woodworking rules for cyber security and privacy

Author: Aaron Pritz– CEO, Principal Consultant, Co-Founder at Reveal Risk Cyber security has seen a “gold rush”…
Assessments

“Climbing GDPR and CCPA” – Privacy Doesn’t Have to Be Everest

Author: Aaron Pritz– CEO, Principal Consultant, Co-Founder at Reveal Risk GDPR (General Data Protection Regulation) brings some…
CybersecurityLeadership

Torpedo! Top 5 Ways to Sink Your OWN Cyber Security Battleship

Author: Aaron Pritz– CEO, Principal Consultant, Co-Founder at Reveal Risk   Updated on September 11, 2018 from…
CybersecurityLeadership

The 3am Cyber Breach and What to Learn From it BEFORE it Happens

Author: Aaron Pritz– CEO, Principal Consultant, Co-Founder at Reveal RiskIt is around 3 a.m. as you are…
Cybersecurity

FREE eBOOK!: Privileged Access Security (for Dummies)

Download Privileged Access Security for dummies here! Aaron Pritz (CEO, Principal Consultant, and Co-Founder of…
News

Press Release: Launch of Reveal Risk

Indianapolis, IN – October 2, 2018 We are happy to announce the launch of a…
CybersecurityLeadership

The CISO of Tomorrow

Author: Aaron Pritz– CEO, Principal Consultant, Co-Founder at Reveal Risk The explosion in media coverage surrounding cybersecurity…
Assessments

Are You Hunting For Trouble? (Audits, Assessments, and Risk… Oh My!)

Author: Aaron Pritz– CEO, Principal Consultant, Co-Founder at Reveal Risk Audits, assessments and risk management activities can…

How can we help you?

We want to hear about your challenges and discuss how we can help.
Contact us for an exploratory conversation.

CONTACT US