Information Security Videos

Cybersecurity Action Month - Incident Response Planning

Creating an Incident Response Plan is more than just creating a peace of mind; it will also be a critical component in restoring what’s lost during a cyber-attack. Jeff Franklin sits down to discuss the key components that each organization – big or small – should include in their plan.

Download Incident Response Flow Chart

Cybersecurity Action Month - Business Impact Analysis

Leading a business means deciding which risks are worth accepting, and a business impact analysis (BIA) provides a critical resource for making informed risk management decisions. Ben Hall sits down to discuss BIA fundamentals and how to get started within your organization.

Download BIA Planner

Cybersecurity Action Month - Understanding Vendor Risk Management

What is vendor risk management and why should you care about it? Matthew McGill discusses cyber risks that can accompany outsourced services, and he walks us through the three phases of vendor management: Identify/Prioritize, Assess, and Track and Monitor.

Download Vendor Management Guide

Cybersecurity Action Month - Employee Security Training

Rather than viewing your employees as a weak link to offset, enlist them as frontline defenders. Pratum's Megan Soat sits down to discuss how changing your mindset—and building it into your cybersecurity training—provides a solid cornerstone for building a successful awareness and training program that your team will embrace.

Download the Employee Training Guide

Cyber Corner - Risk Assessments

Pratum vCISO Ben Hall visits the Cyber Corner with tips for getting the most from risk assessments and why these annual reviews form the cornerstone of every security strategy. Plus, Ben shares the big risks he finds in almost every organization (we’re looking at you, access management and MFA).

Learn More About Risk Assessments

The Pratum Difference in XDR

Catch emerging attacks such as ransomware and business email compromise at the earliest stages. Pratum's service defends your environment with expert SOC analysts leveraging industry-leading tools.

See What XDR Can Do

What is a vCISO?

Pratum’s Virtual CISO (vCISO) service helps businesses develop and implement information security programs that guard sensitive information, strengthen brand reputation, and protect customer data.

Learn More About Our vCISO Service

The Pratum Difference in Risk Assessment

Information Security Risk Assessments assist organizations in making educated security decisions and provides insight into the effectiveness of a security program.

Get Started With a Risk Assessment

The Pratum Difference in Digital Forensics

Pratum's digital forensics service enables clients to make informed decisions about security incidents by identifying, preserving, analyzing, and presenting digital evidence.

Find Out More About Digital Forensics

The Pratum Difference in vCISO

Pratum vCISO delivers expert security leadership and a supporting team of analysts and consultants to solve unique information security challenges.

Learn More About Our vCISO Service

Information Security Awareness and Training

Getting Employees to Care About Securing Data

Make sure to communicate the 'Why' behind cybersecurity. If you want employees to care about protecting data, help them understand the types of data your company handles and how securing that data impacts the success of your business.

View Security Awareness & Training Resources

Vendor Management

Getting Started with IT Vendor Management

Smart vendor management is critical to securing your business. Megan Howard, Manager, Security Consulting at Pratum explains how to vet vendors and how that impacts the potential access to your data. In the following blog article, Megan provides 4 steps to help mature your vendor management program.

Read Vendor Management Blog Article

Due Diligence

Cybersecurity Due Diligence: Questions Every Leader Should Ask Their IT Team

To ensure your organization is mitigating its security risk, and reducing its liability, here are three cybersecurity questions every business leader should ask their technology team.

Read Due Diligence Blog Article

Cyber Liability Insurance

Selecting the Right Cyber Liability Insurance Policy and Developing an Incident Response Plan

There’s no replacement for robust cyber security and training programs but having these programs in place doesn’t mean you should avoid implementing a cyber liability insurance policy.

Read Cyber Insurance Blog Article

The information we track while users are on our websites helps us analyze site traffic, optimize site performance, improve our services, and identify new products and services of interest to our users. To learn more please see our Privacy Policy.