Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 29 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Policy Monitor to launch CSPM, an Information Security Management System, at the International Cyber Expo

Cyber Security Policy Monitor (CSPM) will be demonstrated in the IASME Pavilion at the International Cyber Expo

by Guru Writer
September 12, 2022
in Events, Featured
Policy Monitor to launch CSPM, an Information Security Management System, at the International Cyber Expo
Share on FacebookShare on Twitter

Policy Monitor, the London-based cybersecurity and risk management experts, will launch Cyber Security Policy Monitor (CSPM) at this year’s International Cyber Expo in London. CSPM is a simple and cost-effective cloud-based solution that helps measure, manage and monitor an organisation’s cyber security workflow and compliance. The information security management system gives cyber security peace of mind to organisations of all sizes, including SMEs.

Policy Monitor will be exhibiting and demonstrating the power of Cyber Security Policy Monitor in the IASME Pavilion at the International Cyber Expo at Olympia, London on September 27th and 28th. With cyber threats ever evolving and investment in the sector increasing to an estimated £8.9 billion, the UK is recognised as a leader in the field of cybersecurity and the event will showcase the latest research and innovations, providing an ideal setting to launch CSPM.

CSPM enables organisations to:

  • Locate relevant knowledge by consolidating relevant and useful sites into a single portal from which they can be accessed
  • Define their own security policy as a series of simple workflows covering cyber security awareness and training, preventative tasks and how to respond to incidents.  The status of assets is listed in CSPM, which schedules regular tasks or initiates tasks in response to an event to implement the security policy
  • Run through the pre-loaded IASME questions, prepare a response and load it into the IASME portal for assessment by Policy Monitor’s consultants, who are an IASME certification body
  • Link IASME responses to the company’s security policy and prove that it complies with IASME throughout the year
  • Show an audit trail to prove compliance during the year
  • Integrate with external asset management and cyber security technology so that the risks identified are consolidated into a single picture visible on the dashboard
  • An at-a-glance KPI dashboard shows management a full cyber security status overview enabling the board to monitor compliance across the business and take action before policies are breached.

Cyber Essentials and IASME templates are pre-loaded to embed cyber security best practice and help define, implement and monitor security policies.  There are also US, NIST and HIPAA templates and additional templates which can be created to meet customer needs.

Nick Denning, CEO, Policy Monitor said, “With cyber threats increasing, we want to ensure that the UK is the safest place to do business. Over 60% of SMEs* have reported a data breach in the last year and so Policy Monitor has developed CSPM to bring cyber security best practices, regulatory standards, policies and workflows to organisations of all sizes. CSPM brings support to every stage of the cyber security compliance process. We’ve made sure it is simple to use and easy to manage, removing cost and complexity. It is important for businesses and the UK economy that effective cyber security solutions are available to all so we offer CSPM with a range of affordable SME pricing options.”

Policy Monitor will be providing cyber security advice and demonstrating CSPM live at International Cyber Expo 2022 on stand B60 in the IASME Pavilion.

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Energy Providers Targeted by Lazarus Group

Next Post

Edinburgh’s Adarma partners with The Princes Trust to support inclusivity in cybersecurity

Recent News

Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023
Blue Logo OUTPOST24

New Research Examines Traffers and the Business of Stolen Credentials

March 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information