Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
Coming Soon: Department of Defense Cyber Security Maturity Model Certification Takes Aim at Protecting the Defense Supply Chain
TalaTek examines the new, impending Department of Defense unified certification standard, the Cybersecurity Maturity Model Certification, and what actions vendors should begin to take to prepare.
Making a Workplace Culture of Security a Priority
TalaTek recommends promoting a workplace culture of security and offers 5 steps for creating this environment.
Attracting Female Talent in Technology
TalaTek examines the gender gap in tech and offers five steps to promote tech to more women to help level the playing field.
Avoid Cybersecurity Silos when Developing a Risk Management Program
TalaTek examines why a proactive holistic risk management strategy helps avoid cybersecurity silos and is more effective for organizations and offers seven steps to take to become more secure.
How the Lack of a Strong Cybersecurity Strategy can Impact an Organization
Business leaders must always keep #cybersecurity a tier-one priority when planning. If overlooked, their firm can suffer irreparable damages. Here’s why.
What Third-Party Risk Management Is and How to Get Started
Learn more about third-party risk management and what to expect when working with a third-party risk management firm.
“Shields Up” Can Help Organizations Protect Against State-sponsored Cyberattacks
Learn how Shields Up can help organizations strengthen their cybersecurity practices. Learn how Shields Up can help organizations strengthen their cybersecurity practices.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Understanding The Implications Cyberwarfare Has On Your Cybersecurity Strategy
Here’s what businesses must do to stay ahead of threats, which can often be avoided with appropriate assessment, controls and monitoring
Are You Using These Best Practices to Build a Vendor Risk Management Program?
Vendor management is critical to the security of today’s networks. Learn more about best practices to build a vendor risk management program.
Are You Using These Best Practices to Build a Vendor Risk Management Program?
Today’s IT playing field implores a higher state of alertness, not only within your enterprise but also outside of it. However, when it comes security, not all vendors are created equal. Some very likely have inferior security hygiene and practices that can affect you big time
Are You Using These Best Practices to Build a Vendor Risk Management Program?
Today’s IT playing field implores a higher state of alertness, not only within your enterprise but also outside of it. However, when it comes security, not all vendors are created equal. Some very likely have inferior security hygiene and practices that can affect you big time
Policy Compliance: OneSize Does Not Fit All
How do we get our brains around the arcane topic of policy compliance? Security pros define compliance as adhering to established rules and regulations, codes of conduct, laws, or organizational standards of conduct. For the cybersecurity industry, this means following guidelines established
TalaTek Announces Merger Agreement with CISO Global
TalaTek, an integrated risk management firm, announced a definitive merger agreement with CISO Global Corporation, a cybersecurity consulting and managed services company. Under the terms of the transaction, TalaTek is now a wholly-owned subsidiary of CISO Global and will continue to focus on providing …
How to Select a Cybersecurity Framework to Protect your Greatest Assets: People, Property and Data
A fact of doing business in today’s hyper-internet-connected world is the need for organizations, regardless of size or sector, to protect their enterprises against a constant onslaught of malicious actors, insider threats, and a slew of other cybersecurity risks. It’s more a matter of “when,” not “if” your organization will face an attack. Fortunately, cybersecurity frameworks have been developed that comprise best practices, standards, and guidelines designed to manage risks and combat these threats so you can protect your
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


