9 security questions a director should ask management

Many of these questions reflect back on the principles from the ECODA guidebook: having a solid risk management program, access to security expertise, mitigation of…

The age of digital transformation

Creating a culture of innovation and awareness, in which employees can challenge the status quo while being adequately aware of potential risks.

NMBS-SNCB

A strong focus on security, the staff’s unique expertise, and a down-to-earth approach: that’s what makes Toreon stand out!

Security Rating Services, an essential tool for IT risk management

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Niko

Toreon and Niko’s development teams blended their expertise in IoT security.

Develop a clear security vision and plan (webinar)

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Cybersecurity for Corporate Boards

5 principles to help board members get a grasp on cybersecurity or at least be able to talk about cybersecurity with their management.

TMI newsletter 9 How often do living documents need to breathe?

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…

Implementing remote working in ICS environments

In today’s society it’s become common practice to work and follow up business from home or a remote location. The flexibility which some employees have…

FDA recommends Threat Modeling as Cybersecurity Risk Assessment methodology

We’ve created a whitepaper, in collaboration with experts from the medical device community, to highlight how Threat Modeling can be applied in your field.

Start typing and press Enter to search

Shopping Cart