Cybersecurity Best Practices

Cybersecurity resources, best practices, and tips to help our clients protect their firms from increasing and evolving cyber threats, including ransomware attacks.

Best practices and tips

circuit board abstract

Myths About Cybersecurity Portfolio Oversight: Myth #4

In part 4 of our series we tackle the myth that cyber oversight is (only) about downside risk management.

Article
  • Cybersecurity Resources
  • Cybersecurity
  • Portfolio Company Risk Management
meta person

Myths About Cybersecurity Portfolio Oversight: Myth #3

In part 3 of our series we tackle the myth that "investors don’t care and/or are satisfied with our current approach to cybersecurity."

Article
  • Cybersecurity Resources
  • Cybersecurity
  • Portfolio Company Risk Management
meta person

Myths About Cybersecurity Portfolio Oversight: Myth #2

Cyber threats are on the rise, making robust cybersecurity oversight essential for protecting investments. We debunk a common myth about portfolio oversight.

Article
  • Cybersecurity Resources
  • Cybersecurity
  • Portfolio Company Risk Management
meta person

Myths About Cybersecurity Portfolio Oversight: Myth #1

Cyber threats are on the rise, making robust cybersecurity oversight essential for protecting investments. We debunk a common myth about portfolio oversight.

Article
  • Cybersecurity Resources
  • Cybersecurity
  • Portfolio Company Risk Management
streaks

13 Key Elements for Successful Cybersecurity Portfolio Oversight

Our cyber team has identified the key elements of successful programmatic cyber oversight. By adopting these elements, firms can avoid value destruction, meet investor expectations, and increase valuations of their portfolio.

Article
  • Cybersecurity
  • Cybersecurity Resources
  • Portfolio Company Risk Management
cyber outage

CISO Checklist for First 100 Days of Cybersecurity Program Management

This checklist provides key steps for a new Chief Information Security Officer (CISO) to take to set a cybersecurity program up for success.

Article
  • Cybersecurity
  • Cybersecurity Resources