Skip to content
faviconHow Could Expert Insight Transform Your Business Today?

Learn how our comprehensive services tackle your challenges, from technology to cybersecurity

GET STARTED

services-bg-insights-blog

James Morgenstein

avatar
James provides technology leadership to Vistrada across technology service delivery, software, and infrastructure.

Blog Post by James Morgenstein

James MorgensteinAug 30, 2023

Defining Management Responsibilities of Security Personnel

Managers of all departments need to be involved with ensuring their teams are performing ...
Start Reading
James MorgensteinAug 14, 2023

Implementing Information Security Controls

It has been said that you can suffer the pain of discipline, or you can suffer the pain ...
Start Reading
James MorgensteinAug 2, 2023

Effective Supply Chain Risk Management for Long-Term Success

Poor supply chain risk management, or a total lack thereof, will hurt the long-term ...
Start Reading
James MorgensteinJul 26, 2023

Technical Vulnerability Management: Guide for Effective Cybersecurity

Many organizations struggle with identifying and patching all vulnerabilities. Legacy ...
Start Reading
James MorgensteinJul 26, 2023

Threat Intelligence and Awareness: Guide to Mitigating Security Risks

Awareness of your organization’s threat environment should be maintained so that ...
Start Reading
James MorgensteinApr 17, 2023

Cybersecurity Risk Mitigation

Your organization needs to have defined processes in place for completing risk treatment ...
Start Reading
James MorgensteinApr 16, 2023

Implementing a Cybersecurity Risk Management Program

An enterprise risk management program should be developed to address risks that have the ...
Start Reading
James MorgensteinApr 16, 2023

Cybersecurity Program Roles and Responsibilities

Any organization’s cybersecurity program, and the resulting compliance with control ...
Start Reading
James MorgensteinApr 15, 2023

Performing Enterprise Risk Assessments

Enterprise risk assessments need to be performed regularly (e.g., at least annually) to ...
Start Reading
James MorgensteinApr 13, 2023

Cybersecurity Program Review

Independent reviews of your cybersecurity program are intended to provide an unbiased ...
Start Reading
James MorgensteinApr 13, 2023

Investing in a Cybersecurity Program

A lack of management support for your organization’s cybersecurity program sends the ...
Start Reading
James MorgensteinFeb 24, 2023

Developing a Cybersecurity Policy Template

Cybersecurity policies are key to the success of any cybersecurity, information security, ...
Start Reading
James MorgensteinFeb 23, 2023

7 Reasons to Use vCISO Services

Chief Information Security Officer (CISO) is a role that has been around for decades, but ...
Start Reading
James MorgensteinFeb 23, 2023

Creating a Cybersecurity Program Management Plan

It all starts with a plan. Cybersecurity Program Management Plans are essential. If a ...
Start Reading
James MorgensteinAug 26, 2022

Keeping your Guard Up While Traveling

Delayed flights. Cancelled flights. No hotel room is available. We have all been there. ...
Start Reading