• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Crucial Point LLC

Accelerating Technology

  • About Crucial Point
    • About Bob Gourley
    • Announcements
    • Corporate Events
    • Press
    • CTOvision
      • Go Pro!
  • Contact Us
  • Services
    • Technology Due Diligence
    • CTO Advisory Services
    • Compliance and Cybersecurity
    • CTO-as-a-Service
    • CISO-as-a-Service
    • Corporate Events
  • Crucial Point Clients
  • Cybersecurity Best Practices
    • Cybersecurity Best Practices
    • Cybersecurity At Home
    • Health Insurance Portability and Accountability Act (HIPAA) Security Rule Compliance
    • The FFIEC Cybersecurity Assessment Tool Can Be Used To Raise Your Security Posture
    • Companies Who Interact With European Citizens Must Check Architecture For Compliance With New Data Rules

Crucial Point CTO Provides Best Practices for Cybersecurity in the Digital World

Home » Announcements » Best Practices » Crucial Point CTO Provides Best Practices for Cybersecurity in the Digital World

Crucial Point CTO Bob Gourley was featured in an AT&T report titled Cybersecurity experts talk about the digital world where he provided context including:

Cultural shift

In order to get the most out of a new, powerful, protected network, entire organizations need to work together to make better security processes a fact of daily life.

Security doesn’t end with the IT department, because every part of every company has some network connection, according to Bob Gourley, author of The Cyber Threat, Chuck Brooks, Adjunct Faculty, Georgetown University, Graduate Applied Intelligence Program (Risk Management), and McGladrey. Cybersecurity has to become a cultural expectation, or it won’t work.

Cybersecurity belongs to everyone

“A lot of the mistakes being made are assuming that cybersecurity is just the role of the IT department, when increasingly it’s a digital risk matter where business leaders need to understand they play a very important role in mitigating digital risk and improving cybersecurity,” Gourley says. “It’s about business operations these days, so a big mistake is to think ‘I have a CISO, and that CISO takes care of my cybersecurity for me.’”

For more see:

  • Crucial Point Technology Due Diligence
  • Crucial Point CTO Advisory Services
  • Technology Due Diligence for Mergers and Acquisitions Now Requires Cybersecurity Assessment
  • Leveraging The NIST Cybersecurity Framework To Economically Reduce Cyber Threats
  • CTO Outsourcing and CTO-as-a-Service
  • In Space, No One Can Hear You Scream

Filed Under: Best Practices, Cybersecurity

Primary Sidebar

Our Latest

OODA LLC: Put our team of experts on your side

Crucial Point is now part of OODA LLC. OODA helps our clients identify, manage, and respond to global risks and uncertainties while exploring emerging opportunities and developing robust and … [Read More...] about OODA LLC: Put our team of experts on your side