John Lister at RSA Conference 2019
GPSG’s cyber team had a lot of fun at RSA 2019! We learned about innovative technologies and some of the latest security management approaches. WeContinue Reading
DevOps Security  
Life preserver
GPSG’s Cybersecurity Team recently had the privilege of exploring how to manage insider threat risk during employee termination with Dr. R. Scott Shumate, President ofContinue Reading
Insider Risk Management   ,
This article is part of GPSG’s Cyber Leadership series. This series aims to help cyber and security management leaders make more informed resource and riskContinue Reading
Cybersecurity Leadership  
San Francisco at night
We look forward to engaging on all things cybersecurity at RSA 2019 in the coming weeks! The event is quickly approaching and this year’s focusContinue Reading
GPSG in the Cyber Community  
San Francisco Bridge
No organization is immune from a cyber attack and most have suffered an incident, whether internal or external. When it comes to cyber risk forContinue Reading
Cyber Assessment  
Cryptocurrency
This is the first article in a two-part series focused on proactively managing cryptojacking risk to prevent cryptojacking at your company and focused on whyContinue Reading
Cryptocurrency, Cyber Attacks, Malware  
Icons for Facebook, Twitter, Instagram, Yelp, etc.
Social media is fun, convenient, and in a lot of cases FREE. However, we must understand that by choosing to use social media, we areContinue Reading
Cyber Threat, Data Privacy  
Hand reaching out from an endpoint device
Remembering my childhood, I recall when riding your bicycle with anything more than a helmet made you seem weak. Kids scoffed and mocked the kidsContinue Reading
Cyber Risk Management   ,
University of Tulsa Cybersecurity Leadership & Technology Summit
There is a lot going on in the Tulsa cyber community right now! The Tulsa Cyber Summit is quickly approaching. It is being hosted byContinue Reading
GPSG in the Cyber Community  
Data Privacy Regulation is Increasing The increasing push for formalized U.S. data privacy legislation will certainly force a course correction for security teams handling personallyContinue Reading
Compliance, Data Protection   ,