GPSG’s cyber team had a lot of fun at RSA 2019! We learned about innovative technologies and some of the latest security management approaches. WeContinue Reading
GPSG’s Cybersecurity Team recently had the privilege of exploring how to manage insider threat risk during employee termination with Dr. R. Scott Shumate, President ofContinue Reading
This article is part of GPSG’s Cyber Leadership series. This series aims to help cyber and security management leaders make more informed resource and riskContinue Reading
February 28, 2019
GPSG at RSA 2019
We look forward to engaging on all things cybersecurity at RSA 2019 in the coming weeks! The event is quickly approaching and this year’s focusContinue Reading
February 20, 2019
How to Bridge the Cyber Risk Integration Gap for M&A
No organization is immune from a cyber attack and most have suffered an incident, whether internal or external. When it comes to cyber risk forContinue Reading
February 13, 2019
4 Signs You Are Cryptojacked, Part 1
This is the first article in a two-part series focused on proactively managing cryptojacking risk to prevent cryptojacking at your company and focused on whyContinue Reading
February 8, 2019
12 Tips to Protect Your Social Media Privacy
Social media is fun, convenient, and in a lot of cases FREE. However, we must understand that by choosing to use social media, we areContinue Reading
February 1, 2019
How Attack Surface Analysis Informs Cybersecurity Planning
Remembering my childhood, I recall when riding your bicycle with anything more than a helmet made you seem weak. Kids scoffed and mocked the kidsContinue Reading
January 30, 2019
GPSG Supporting the Tulsa Cyber Summit
There is a lot going on in the Tulsa cyber community right now! The Tulsa Cyber Summit is quickly approaching. It is being hosted byContinue Reading
January 28, 2019
4 Ways Your Business Can Keep Up with Data Privacy Regulation
Data Privacy Regulation is Increasing The increasing push for formalized U.S. data privacy legislation will certainly force a course correction for security teams handling personallyContinue Reading










