Topic:

Show All

Mike Skinner

Mike is the partner in charge of HORNE Cyber. His primary focus is to enable clients to fully leverage technology innovations by providing the insights critical to safeguarding their business, customers’ critical data and brand reputation. He is responsible for information technology audit, regulatory compliance, information security consulting, internal control consulting and business solution implementation.
Find me on:

Recent Posts

April 20, 2017

4 Evolving Cyber Disruptions That Should be Included in Your Strategic Planning

In today’s business environment, market disruptions are a persistent topic of strategic planning discussions. Automation, artificial intelligence and increased connectivity will continue to drive our growth strategies, but it is crucial that organizations consider cybersecurity evolution in the strategic plans. Below are 4 evolving areas that will drive your organization’s success or peril over the next 3-5 years.

Continue reading >

Topics: Strategy, Business Planning, Disruption

January 26, 2017

4 Reasons Why Hiring the Wrong Penetration Testing Firm Will Hurt

Watch the news—cybersecurity is the hot topic in the business world today. With all this attention, it’s no surprise that more service providers are adding cybersecurity to their service menu. Offense-oriented services, like penetration testing, can be a cost-effective way to identify vulnerabilities. Executives, senior management, and boards of directors are keen to find their own weaknesses, as they are the ones that will be held accountable in a breach.

Continue reading >

Topics: Penetration Tests, Data Breach, Data

December 08, 2016

Building Your Cybersecurity Strategy for 2017

Developing a cybersecurity strategy can give your organization the foundation and mandate to develop good policies and procedures for improving resilience. As 2016 comes to an end and we begin looking into 2017, I want to reflect and provide a few observations of strategic cybersecurity mistakes we have seen this year resulting in major losses for many organizations.

Continue reading >

Topics: Strategy, Cyberattack, Cyber Security

October 29, 2015

Don’t Get Spooked by Your Vendor’s Cybersecurity

It’s Halloween, and tiny goblins will be out for trick or treat on Saturday night. In this week’s blog, I thought I’d give you a few tips so you won’t be tricked by your vendor’s cybersecurity.

Continue reading >

Topics: Cyber Security

September 10, 2015

Incident Response Plans

I’m sure you’ve heard the saying, “Hope for the best, but expect the worst.” I’d like to offer the IT incident response version, “Hope for the best, but plan for the worst.”

Continue reading >

Topics: Data Breach

September 03, 2015

Top 5 Ways to Secure Your Data

How secure is your business data?

If you’re like many CEOs and CFOs, you hope it’s safe, but you have other, more pressing issues to address. I’ve heard many business leaders explain the reasons hackers wouldn’t be interested in their data: they’re too small, they don’t handle medical records, they don’t process credit cards, or they don’t sell anything over the Internet.

Continue reading >

Topics: Data Breach, Cyber Security

July 09, 2015

Outsourcing: 5 Security Considerations

With the rapid evolution of cloud based computing, many organizations face the fundamental question of whether or not they should employ third party solutions to facilitate convenience within their entity.

Continue reading >

Topics: Cyber Security

RELATED POSTS