Articles by David Lefever

Filter By Topic
AI & Machine Learning(2)
Cybersecurity(37)
Filter By Industry
Energy & Utilities(1)
Financial Services(1)
Healthcare(1)
Insurance(1)
Showing 1-12 of 37 results
David Lefever

David Lefever

Vice President | Cybersecurity

David has expertise in cyber strategy, enterprise risk management, and framework selection and adoption. David has worked in IT and cyber risk management for 20 years and is located in Carmel, IN. David loves fly fishing, live music, time with family, and a healthy work environment. Follow David on LinkedIn.

How to Prepare for a Cybersecurity Audit: 7 Steps to Improve Your Compliance Readiness

Discover how to prepare for a cybersecurity audit, and learn seven essential steps to enhance your compliance readiness.

The Top Questions to Ask When Selecting a GRC Tool

Learn about key considerations when selecting a GRC tool. We aim to help you choose the right tool to boost compliance.

How to Stay Resilient (and Protect Your Organization) With Cybersecurity Maturity Assessments

Cyber threats continue to evolve. A cybersecurity maturity assessment helps businesses strengthen their defenses before an attack occurs.

PCI Compliance Validation: Are You Ready for Your Next Audit?

Learn about the essential steps for maintaining PCI compliance between audits. Proactive PCI compliance validation ensures audit readiness.

How to Test Your Current Compliance Controls to Identify Hidden Risks

Testing compliance controls helps you find security gaps and how checkbox compliance fails against modern threats.

How a Cybersecurity Risk Assessment Helps You Take Control of Business Security

Learn how a robust cybersecurity risk assessment forms the foundation of a successful assessment risk cybersecurity program.

We Predict Cybersecurity Trends for 2025: 3 Key Areas AI Will Disrupt

We share our top three predictions for cybersecurity trends in 2025 and how AI has increased the sophistication of cyber threats.

How to Vet Identity and Access Management Tools

Selecting the right identity and access management tool is a critical strategic decision that extends far beyond basic security measures.

When to Engage Regulatory Compliance Consulting

Learn the role of regulatory compliance consulting and strategic insights into when and why organizations should seek expert guidance.

Is Your Current Vendor Risk Management Policy Effective?

Learn how vendor risk management has become a critical strategic imperative for organizations seeking to protect their digital assets.

How to Proactively Secure Your Business with Penetration Testing

Cybersecurity penetration testing is important to identify security vulnerabilities, maintain compliance, and preserve customer trust.

The Step-by-Step Guide to GRC Implementation: Essential Steps for Success

Learn GRC implementation steps, specifically the importance, process and benefits of implementing a GRC framework effectively.