Videos
Information security videos
This page will be updated monthly with new video content.
What is a vCISO
Pratum’s Virtual CISO (vCISO) service helps businesses develop and implement information security programs that guard sensitive information, strengthen brand reputation, and protect customer data.
vCISOThe Pratum Difference in Risk Assessment
Information Security Risk Assessments assist organizations in making educated security decisions and provides insight into the effectiveness of a security program. .
Risk AssessmentThe Pratum Difference in Digital Forensics
Pratum's digital forensics service enables clients to make informed decisions about security incidents by identifying, preserving, analyzing, and presenting digital evidence.
Digital ForensicsThe Pratum Difference in vCISO
Pratum vCISO delivers expert security leadership and a supporting team of analysts and consultants to solve unique information security challenges.
vCISOIncident Response Planning
How To Get Started and What To Include In The Plan
Establishing an incident response plan that describes the actions, steps, and resources necessary for organizations to effectively respond to an incident.
Incident ResponseDigital Forensics and Incident Response
The Importance of Digital Investigations
Containment, preservation of evidence, and a forensic review are some of the critical actions taken during a cyber incident.
Digital ForensicsPenetration Testing
Thorough Reports. Actionable Recommendations
Penetration testing is a proactive approach to discovering exploitable vulnerabilities in your web applications, computer systems, and networks.
Penetration TestingDigital Forensics
Proactively Develop an Incident Response Plan.
During a security incident, there will be a lot of questions. It’s smart to include legal counsel, cyber insurance carriers, and information security providers early in your investigation process. Set investigation objectives and communicate them clearly and frequently to bring clarity to your team and those involved.
Digital ForensicsIncident Response Planning
Proactively Develop an Incident Response Plan
Without a formalized Incident Response Plan, crucial steps can be missed, resulting in additional exposure to an organization.
Incident ResponseBusiness Size and Security Risk
Business Size Doesn't Determine Security Risk
All businesses have valuable data, and the size of your business doesn't determine security risk.
Risk-based CybersecurityRisk Response
Take Initiative and Address Risk
There are four key risk response actions businesses should address as part of their risk management program.
Read NIST SP 800-39OT Security
The Importance of OT Security in the Modern Workforce
As the world of information technology and operational technology converge, so do cybersecurity risks. Operational technology used in manufacturing, utilities, transportation and other industries is at risk of cyberattacks now more than ever.
Read OT Security ArticleCybersecurity Control Framework
Center for Internet Security CIS 20
Adopting and implementing a control framework, such as the Center for Internet Security's Controls Version 7, also referred to as the CIS 20, will posture an organization to minimize security risks to data and information, computer systems, physical property, and other assets.
Cloud Security
Getting Involved with Cloud Security
Security in the cloud should be viewed as a shared responsibility. With many organizations moving some, or all, of their data to the cloud, it’s important they understand, evaluate, and adopt the security solutions available to minimize and address risk.
Read Amazon EC2 Security ArticleInformation Security Awareness and Training
Getting Employees to Care About Securing Data
Make sure to communicate the 'Why' behind cybersecurity. If you want employees to care about protecting data, help them undertand the types of data your company handles and how securing that data impacts the success of your business.
View Security Awareness & Training ResourcesVendor Management
Getting Started with IT Vendor Management
Smart vendor management is critical to securing your business. Megan Howard, Manager, Security Consulting at Pratum explains how to vet vendors and how that impacts the potential access to your data. In the following blog article, Megan provides 4 steps to help mature your vendor management program.
Read Vendor Management Blog ArticleDue Diligence
Cybersecurity Due Diligence: Questions Every Leader Should Ask Their IT Team
To ensure your organization is mitigating its security risk, and reducing its liability, here are three cybersecurity questions every business leader should ask their technology team.
Read Due Diligence Blog ArticleCyber Liability Insurance
Selecting the Right Cyber Liability Insurance Policy and Developing an Incident Response Plan
There’s no replacement for robust cyber security and training programs but having these programs in place doesn’t mean you should avoid implementing a cyber liability insurance policy.
Read Cyber Insurance Blog Article