top of page
Search
All Posts


Contextualizing Risk: Moving Beyond Flat Risk Registers
Traditional risk registers, which list risks as isolated items, are quickly becoming outdated in the face of modern complexity. Organizations are recognizing that risks are deeply interconnected, and a flat, one-dimensional view fails to capture knock-on impacts or the true nature of risk exposure.

NTM Team
3 days ago3 min read
27 views
0 comments


ESG and Sustainable GRC: From Reporting to Real Impact
What’s the key to success when it comes to ESG Integration. Businesses are finding out that they can't just bolt ESG onto their existing processes and expect it to work. It needs to be woven into the fabric of how an organization operates.

NTM Team
3 days ago4 min read
14 views
0 comments


Before You Adopt AI: Expected Changes in Laws and Regulations
Before you dive headfirst into AI adoption, recognize that you're not just implementing new technology — you're entering a regulatory environment that's changing rapidly and taking on security and compliance risks that shouldn’t be underestimated.

NTM Team
3 days ago4 min read
14 views
0 comments


Building a Zero-Trust Architecture: Practical Steps for 2025
As threat actors get sneakier and traditional network borders fade away, applying principles of zero-trust security is becoming a...

NTM Team
May 124 min read
17 views
0 comments


21 Free Resources Every Small Business Should Know About in 2025
A wealth of free resources is available to help entrepreneurs at every stage, whether you’re just launching, looking to grow, or navigating new challenges. Here’s a roundup of some of the best free tools and programs to help your small business thrive year-round.

NTM Team
May 124 min read
43 views
0 comments


Practical Tips for Enhancing Your Risk Management Program
Organizations can no longer afford to treat risk management as a siloed or static function; instead, it must be an adaptive, organization-wide discipline that proactively addresses both obvious and hidden vulnerabilities.

NTM Team
May 123 min read
46 views
0 comments


Webcast Event: ‘Defend the Whole Kingdom or Just the Crown Jewels?’ with Mike Ellerhorst
Upcoming event - May 7, 2025 12:00 PM - 1:00 PM MDT | Click to learn more or register!

NTM Team
May 51 min read
44 views
0 comments


Questions to Ask Your vCISO: A Practical Checklist for Organizational Resilience
Choosing a vCISO is a pivotal decision for your organization’s security and compliance journey. By following this structured checklist, you can ensure that your vCISO partner brings the right approach to helping your business thrive,

NTM Team
May 56 min read
56 views
0 comments


Digital Footprinting and Executive Exposure: How Attackers Target Leadership and How vCISOs Mitigate Risks
Attackers increasingly exploit digital footprints — publicly available personal and professional information — to orchestrate targeted attacks, ranging from phishing scams to physical threats, against key personnel.

NTM Team
May 53 min read
17 views
0 comments


The Dark Web Economy of Stolen Healthcare Data
As criminal tactics grow more sophisticated, organizations that adopt proactive security postures will be best positioned to protect both their operations and their patients' most sensitive information.

NTM Team
May 53 min read
33 views
0 comments


The AI Balancing Act in Financial GRC: Navigating Compliance, Risk, and Innovation
Financial institutions face a complex challenge in adopting AI for governance, risk, and compliance (GRC): balancing efficiency gains with regulatory scrutiny and operational risks.

NTM Team
Apr 283 min read
16 views
0 comments


Secure-by-Design Initiatives: The Road to Compliance-Driven IT Transformation?
As regulatory scrutiny intensifies, compliance frameworks are no longer optional — they’re the bedrock of resilient, future-ready IT ecosystems.

NTM Team
Apr 282 min read
20 views
1 comment


The New Era of Mandatory Network Segmentation in Healthcare
Healthcare cybersecurity is getting a major shake-up in 2025. The latest HIPAA Security Rule updates have turned network segmentation from a "nice-to-have" into a "must-have,"

NTM Team
Apr 282 min read
21 views
0 comments


Vendor Risk Management: The Weakest Link in Regional Bank Security?
As third-party breaches surge and regulatory scrutiny mounts, vendor risk management is no longer a “check-the-box” exercise — it’s a strategic imperative.

NTM Team
Apr 213 min read
0 views
0 comments


SMBs and the vCISO Advantage: Cost-Effective Risk Management in a Tight Talent Market
Small and midsize businesses (SMBs) face a cybersecurity paradox: they face increasing risk from cybercriminals, yet often lack the resources for full-time, in-house security leadership.

NTM Team
Apr 214 min read
0 views
0 comments


De-risking vs. Risk Management in IT Security: A Strategic Comparison
De-risking and risk management are foundational concepts in IT security, but they are often misunderstood or used interchangeably. Clarifying the distinction — and the synergy — between these approaches is essential for guiding clients toward a resilient, business-aligned security posture.

NTM Team
Apr 182 min read
3 views
0 comments


Winning Hearts and Minds: How vCISOs Can Drive Stakeholder Engagement for Compliance Success
Virtual Chief Information Security Officers do more than just implement technical controls — they serve as catalysts for meaningful change.

NTM Team
Apr 115 min read
29 views
0 comments
bottom of page