Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

The Risk Rack written by Frank Cassano

Frank Cassano

Frank Cassano is an information risk management consultant with over 20 years experience in the field. His experience includes both internal corporate experience as he has held a number of senior Information Technology management positions within organizations, as well as external experience as he has been an external consultant and trusted advisor with dozens of clients. Mr. Cassano was CISO at People’s Bank. Prior that he was CISO at Prudential Securities, and Audit Director at Prudential Insurance (PSI), Senior Auditor at Coopers & Lybrand. A graduate of Pace University, with a BBA degree in Management Information Systems, Cassano also is a Certified Information Systems Security Professional (CISSP) and has served on the board of the New York Metro ISSA.

It’s All About the People: Assessing Your Organization’s Network Perimeter (pt. 4)

– Welcome once again to the risk rack. This time on the risk rack we will be continuing our review of how to assess your organization’s network perimeter. As a reminder the identified steps were: Step 1: Define the functions and purposes of your network perimeter. Step 2: Assess the technology…

Assessing your Organization’s Network Perimeter (pt. 3)

– Welcome once again to the risk rack. This time on the risk rack we will be continuing our review of how to assess your organization’s network perimeter. As a reminder the identified steps were: Step 1: Define the functions and purposes of your network perimeter. Step 2: Assess the technology…

Assessing your Organization’s Network Perimeter (pt. 2)

– Welcome once again to the risk rack. This time on the risk rack we will be continuing our review of how to assess your organization’s network perimeter. As a reminder the identified steps were: Step 1: Define the functions and purposes of your network perimeter. Step 2: Assess the technology…

Assessing your Organization’s Network Perimeter (pt. 1)

– Welcome once again to the risk rack. This time on the risk rack we will be reviewing how to assess your organization’s network perimeter. The assessment of a network perimeter has six major steps: Define the functions and purposes of your network perimeter. Assess the technology used along the…

Your Information Security Program: It’s All About The Bones

– Welcome once again to the risk rack. This time on the risk rack I will be discussing the bones of an information security program namely the fundamental framework and standards around which you choose to build your program. As with any living and breathing creature the creature’s bone structure…