Information Security Videos
Cybersecurity Action Month - Incident Response Planning
Creating an Incident Response Plan is more than just creating a peace of mind; it will also be a critical component in restoring what’s lost during a cyber-attack. Jeff Franklin sits down to discuss the key components that each organization – big or small – should include in their plan.
Download Incident Response Flow ChartCybersecurity Action Month - Business Impact Analysis
Leading a business means deciding which risks are worth accepting, and a business impact analysis (BIA) provides a critical resource for making informed risk management decisions. Ben Hall sits down to discuss BIA fundamentals and how to get started within your organization.
Download BIA PlannerCybersecurity Action Month - Understanding Vendor Risk Management
What is vendor risk management and why should you care about it? Matthew McGill discusses cyber risks that can accompany outsourced services, and he walks us through the three phases of vendor management: Identify/Prioritize, Assess, and Track and Monitor.
Download Vendor Management GuideCybersecurity Action Month - Employee Security Training
Rather than viewing your employees as a weak link to offset, enlist them as frontline defenders. Pratum's Megan Soat sits down to discuss how changing your mindset—and building it into your cybersecurity training—provides a solid cornerstone for building a successful awareness and training program that your team will embrace.
Download the Employee Training GuideCyber Corner - Risk Assessments
Pratum vCISO Ben Hall visits the Cyber Corner with tips for getting the most from risk assessments and why these annual reviews form the cornerstone of every security strategy. Plus, Ben shares the big risks he finds in almost every organization (we’re looking at you, access management and MFA).
Learn More About Risk AssessmentsThe Pratum Difference in XDR
Catch emerging attacks such as ransomware and business email compromise at the earliest stages. Pratum's service defends your environment with expert SOC analysts leveraging industry-leading tools.
See What XDR Can DoWhat is a vCISO?
Pratum’s Virtual CISO (vCISO) service helps businesses develop and implement information security programs that guard sensitive information, strengthen brand reputation, and protect customer data.
Learn More About Our vCISO ServiceThe Pratum Difference in Risk Assessment
Information Security Risk Assessments assist organizations in making educated security decisions and provides insight into the effectiveness of a security program.
Get Started With a Risk AssessmentThe Pratum Difference in Digital Forensics
Pratum's digital forensics service enables clients to make informed decisions about security incidents by identifying, preserving, analyzing, and presenting digital evidence.
Find Out More About Digital ForensicsThe Pratum Difference in vCISO
Pratum vCISO delivers expert security leadership and a supporting team of analysts and consultants to solve unique information security challenges.
Learn More About Our vCISO ServiceInformation Security Awareness and Training
Getting Employees to Care About Securing Data
Make sure to communicate the 'Why' behind cybersecurity. If you want employees to care about protecting data, help them understand the types of data your company handles and how securing that data impacts the success of your business.
View Security Awareness & Training ResourcesVendor Management
Getting Started with IT Vendor Management
Smart vendor management is critical to securing your business. Megan Howard, Manager, Security Consulting at Pratum explains how to vet vendors and how that impacts the potential access to your data. In the following blog article, Megan provides 4 steps to help mature your vendor management program.
Read Vendor Management Blog ArticleDue Diligence
Cybersecurity Due Diligence: Questions Every Leader Should Ask Their IT Team
To ensure your organization is mitigating its security risk, and reducing its liability, here are three cybersecurity questions every business leader should ask their technology team.
Read Due Diligence Blog ArticleCyber Liability Insurance
Selecting the Right Cyber Liability Insurance Policy and Developing an Incident Response Plan
There’s no replacement for robust cyber security and training programs but having these programs in place doesn’t mean you should avoid implementing a cyber liability insurance policy.
Read Cyber Insurance Blog Article