Skip to content
TRAC-Logo
 

Frustration-Free Risk Management

Simplify cybersecurity risk management and tackle your cybersecurity challenges with ease. TRAC automates the tedious risk assessment process and produces customized results that align with regulations, best practices, and your strategic goals.

Blog_HeaderGradients-10

Cody Delzer

avatar
Cody Delzer is a Senior Vice President Information Security Consultant and Regional Director at SBS CyberSecurity.

Blog Post by Cody Delzer

Vendor Management in a Vendor Breach

Discover how to protect your business from vendor breaches and ensure the security of your valuable data.
Start Reading

SBS Institute: Crafting Your Ultimate Incident Response Strategy

Equip yourself with essential tips and strategies for building a robust Incident Response Plan.
Start Reading

SBS Institute: New Interagency Guidance on Third-Party Relationships: Risk Management - What You MUST Know!

Discover the new joint interagency playbook on vendor management, replacing outdated guidelines from the FDIC, OCC, and FRB. Stay compliant with our website's resources.
Start Reading

Interagency Guidance on Risks Associated with Third-Party Relationships

Have you found yourself waiting for new guidance for vendor management? Have you felt on your own to determine what the best path forward is? If so, you are not alone. The good news is that it is finally here, and it is here in a significant way!
Start Reading

Data Flow Diagrams 101

What is a data flow diagram, why are they important, and where do you start when creating one? Let's cover the basics and get you started on the right path.
Start Reading

Cyber Incident Reporting for Critical Infrastructure Act of 2022

On March 15, 2022, President Biden signed the Consolidated Appropriations Act, 2022, H.R. 2471, which is the fiscal year 2022 omnibus spending bill. Of special interest in the bill is the Cyber Incident Reporting for Critical Infrastructure Act of 2022.
Start Reading

How the Cyber Kill Chain Can Help You Protect Against Attacks

Discover how the Cyber Kill Chain aids in crafting robust defense strategies against the Advanced Persistent Threat, mapping controls to seven crucial attack stages.
Start Reading