Stephanie Goetz

3 min read

Does Simulated Phishing Training Actually Work?

This has been a very interesting question since we’ve started phishing training, which for me was around 2016. So, for about ten years, I’ve heard people challenge whether there is any evidence that phishing simulations reduce the likelihood that an...

Read More

2 min read

How AI will Impact Information Security

Artificial Intelligence (AI) is continuing to evolve, and more institutions are implementing it in different ways, such as chatbots, automation of...

Read More

2 min read

Quantum Computing: Another Huge Leap in Technology

I read about the potential in the pairing Artificial Intelligence (AI) and Quantum computing online this week and the thought of those paired had me...

Read More

2 min read

Five Essential Cybersecurity Tasks to Complete Before Year-End

As we approach the end of the year, it's crucial for institutions to ensure their cybersecurity measures are robust and up to date. We typically put...

Read More

1 min read

Dive into Secure Cloud Configuration with SCuBA

CISA, the US Cybersecurity & Infrastructure Security Agency, began an initiative to help organizations manage cloud risks with the Secure Cloud...

Read More

3 min read

CrowdStrike and Supply Chain Risk Management—What Can we Learn From this Experience?

Wow, how much technology has changed in the past 15 years? I remember when “vendor” reviews were uncommon, technology was hosted in-house in 95% of...

Read More

2 min read

Artificial Intelligence–How will it be regulated

Institutions are looking at services using Artificial Intelligence (AI), such as loan decisioning, resume review, and process automation. Using these...

Read More

2 min read

Hacker Psychology

Many of you have probably heard the adage that one of the best ways to catch a criminal is to think like one. Recently, I discovered several articles...

Read More

2 min read

NIST Releases Cybersecurity Framework 2.0

The National Institute for Standards and Technology released an update to its Cybersecurity Framework (CSF) late February. The CSF was originally...

Read More

3 min read

The Three Lines of Defense

We have referenced this concept in blog posts previously related to growing your Information Security Program and ensuring independence in your...

Read More