Information security videos

This page will be updated monthly with new video content.

What is a vCISO

Pratum’s Virtual CISO (vCISO) service helps businesses develop and implement information security programs that guard sensitive information, strengthen brand reputation, and protect customer data.


The Pratum Difference in Risk Assessment

Information Security Risk Assessments assist organizations in making educated security decisions and provides insight into the effectiveness of a security program. .

Risk Assessment

The Pratum Difference in Digital Forensics

Pratum's digital forensics service enables clients to make informed decisions about security incidents by identifying, preserving, analyzing, and presenting digital evidence.

Digital Forensics

The Pratum Difference in vCISO

Pratum vCISO delivers expert security leadership and a supporting team of analysts and consultants to solve unique information security challenges.


Business Continuity and Disaster Recovery

Disaster Recovery

Incident Response Planning

How To Get Started and What To Include In The Plan

Establishing an incident response plan that describes the actions, steps, and resources necessary for organizations to effectively respond to an incident.

Incident Response

Digital Forensics and Incident Response

The Importance of Digital Investigations

Containment, preservation of evidence, and a forensic review are some of the critical actions taken during a cyber incident.

Digital Forensics

Penetration Testing

Thorough Reports. Actionable Recommendations

Penetration testing is a proactive approach to discovering exploitable vulnerabilities in your web applications, computer systems, and networks.

Penetration Testing

Digital Forensics

Proactively Develop an Incident Response Plan.

During a security incident, there will be a lot of questions. It’s smart to include legal counsel, cyber insurance carriers, and information security providers early in your investigation process. Set investigation objectives and communicate them clearly and frequently to bring clarity to your team and those involved.

Digital Forensics

Incident Response Planning

Proactively Develop an Incident Response Plan

Without a formalized Incident Response Plan, crucial steps can be missed, resulting in additional exposure to an organization.

Incident Response

Business Size and Security Risk

Business Size Doesn't Determine Security Risk

All businesses have valuable data, and the size of your business doesn't determine security risk.

Risk-based Cybersecurity

Risk Response

Take Initiative and Address Risk

There are four key risk response actions businesses should address as part of their risk management program.

Read NIST SP 800-39

OT Security

The Importance of OT Security in the Modern Workforce

As the world of information technology and operational technology converge, so do cybersecurity risks. Operational technology used in manufacturing, utilities, transportation and other industries is at risk of cyberattacks now more than ever.

Read OT Security Article

Cybersecurity Control Framework

Center for Internet Security CIS 20

Adopting and implementing a control framework, such as the Center for Internet Security's Controls Version 7, also referred to as the CIS 20, will posture an organization to minimize security risks to data and information, computer systems, physical property, and other assets.

Cloud Security

Getting Involved with Cloud Security

Security in the cloud should be viewed as a shared responsibility. With many organizations moving some, or all, of their data to the cloud, it’s important they understand, evaluate, and adopt the security solutions available to minimize and address risk.

Read Amazon EC2 Security Article

Information Security Awareness and Training

Getting Employees to Care About Securing Data

Make sure to communicate the 'Why' behind cybersecurity. If you want employees to care about protecting data, help them understand the types of data your company handles and how securing that data impacts the success of your business.

View Security Awareness & Training Resources

Vendor Management

Getting Started with IT Vendor Management

Smart vendor management is critical to securing your business. Megan Howard, Manager, Security Consulting at Pratum explains how to vet vendors and how that impacts the potential access to your data. In the following blog article, Megan provides 4 steps to help mature your vendor management program.

Read Vendor Management Blog Article

Due Diligence

Cybersecurity Due Diligence: Questions Every Leader Should Ask Their IT Team

To ensure your organization is mitigating its security risk, and reducing its liability, here are three cybersecurity questions every business leader should ask their technology team.

Read Due Diligence Blog Article

Cyber Liability Insurance

Selecting the Right Cyber Liability Insurance Policy and Developing an Incident Response Plan

There’s no replacement for robust cyber security and training programs but having these programs in place doesn’t mean you should avoid implementing a cyber liability insurance policy.

Read Cyber Insurance Blog Article

The information we track while users are on our websites helps us analyze site traffic, optimize site performance, improve our services, and identify new products and services of interest to our users. To learn more please see our Privacy Policy.