Videos

Information security videos

This page will be updated monthly with new video content. If you have suggestions for video topics, please contact us.


Business Size and Security Risk

Business Size Doesn't Determine Security Risk

All businesses have valuable data, and the size of your business doesn't determine security risk.

Risk-based Cybersecurity

Risk Response

Take Initiative and Address Risk

There are four key risk response actions businesses should address as part of their risk management program.

Read NIST SP 800-39

OT Security

The Importance of OT Security in the Modern Workforce

As the world of information technology and operational technology converge, so do cybersecurity risks. Operational technology used in manufacturing, utilities, transportation and other industries is at risk of cyberattacks now more than ever.

Read OT Security Article

Cybersecurity Control Framework

Center for Internet Security CIS 20

Adopting and implementing a control framework, such as the Center for Internet Security's Controls Version 7, also referred to as the CIS 20, will posture an organization to minimize security risks to data and information, computer systems, physical property, and other assets.


Cloud Security

Getting Involved with Cloud Security

Security in the cloud should be viewed as a shared responsibility. With many organizations moving some, or all, of their data to the cloud, it’s important they understand, evaluate, and adopt the security solutions available to minimize and address risk.

Read Amazon EC2 Security Article

Information Security Awareness and Training

Getting Employees to Care About Securing Data

Make sure to communicate the 'Why' behind cybersecurity. If you want employees to care about protecting data, help them undertand the types of data your company handles and how securing that data impacts the success of your business.

View Security Awareness & Training Resources

Vendor Management

Getting Started with IT Vendor Management

Smart vendor management is critical to securing your business. Megan Howard, Manager, Security Consulting at Pratum explains how to vet vendors and how that impacts the potential access to your data. In the following blog article, Megan provides 4 steps to help mature your vendor management program.

Read Vendor Management Blog Article

Due Diligence

Cybersecurity Due Diligence: Questions Every Leader Should Ask Their IT Team

To ensure your organization is mitigating its security risk, and reducing its liability, here are three cybersecurity questions every business leader should ask their technology team.

Read Due Diligence Blog Article

Cyber Liability Insurance

Selecting the Right Cyber Liability Insurance Policy and Developing an Incident Response Plan

There’s no replacement for robust cyber security and training programs but having these programs in place doesn’t mean you should avoid implementing a cyber liability insurance policy.

Read Cyber Insurance Blog Article

The information we track while users are on our websites helps us analyze site traffic, optimize site performance, improve our services, and identify new products and services of interest to our users. To learn more please see our Privacy Policy.
Privacy Policy Ok