Welcome to CyberRiskConnect.com
You must be a registered user to access CyberRiskConnect.com
- If you are already registered, enter your Username and Password in the Member Login box in the upper right corner of this screen.
- If this is your first time here, please complete the New User Registration form below.
Note: You must have a valid Access Code in order to complete your registration. You should have received an Access Code with your policy. If you do not have an Access Code, please contact Elissa Doroff at email@example.com. If you have an Access Code, but are experiencing difficulties registering or logging in, please contact firstname.lastname@example.org.
New User Registration
An often-overlooked risk in cyber security is software development and testing, which is often done in house in large companies. To test software, engineers utilize either scrubbed data and where the process of scrubbing personally identifiable information is too complex, costly or time-consuming, live data is used, posing serious security and privacy risks. I learned more about this issue by talking to Chris Pillay, CEO of Meridian Technologies.
Why would a company need to be concerned about sensitive data in their own environment?