Feeling overwhelmed by cyber risk? You're not alone. In today's digital world, cyber threats are a complex issue and a strategic opportunity to strengthen your organization's resilience.
This podcast dives deep into the world of cyber governance and risk management. We'll have open conversations with experts to help you take your organization's cybersecurity posture from "as-is" to the next level.
Here's what you'll learn:
Join us and learn how to navigate the ever-evolving cyber landscape with confidence.
The problem educational narrative about “college” has created a false dichotomy between the two well-discussed college purposes. Some say college is about preparing a person for…
Addressing the Highest Risks
As we conclude the risk assessment and governance process, the last part will deal with the organization's highest risks, not the highest vulnerabili…
Cybersecurity Risk Assessment
Risk assessment is not necessarily scanning your network aimlessly; what should you expect from your team? First and foremost, adopt a risk assessme…
Cybersecurity Governance
Once you have your hardware and software inventories, the next step might not be obvious. Still, before performing a risk assessment, you’ll need to esta…
The NIST CSF subcategory ID.AM-2 deals with the inventory of software platforms and applications used in your organization. Most organizations will that creating an inventory of…
Cybersecurity Risk Management - Physical Devices
The risk management process entails four fundamental concepts, which can be further broken down; however, the fundamental concept…
Questions Boards Should Ask
The challenge for directors or investors is determining the organizational overall cybersecurity maturity relative to the risk. The board of directors…
Cybersecurity Confidence vs. Performance
Several studies conducted in other fields showed how spending effort on analysis improved confidence even when the actual performance was…
Asset management is most commonly associated with cybersecurity hygiene, which is associated with patching, anti-virus, access control, and other asset-specific protections. How…
There are two types of third-party risk: product vendors and service providers. Product vendors outsource software, platform, and infrastructure, known as SaaS, PaaS, and IaaS. …
Cyber attacks targetting small businesses that often do not have the resources to defend against devastating attacks like ransomware have grown. As a small business CEO or CIO, …
Third-Party Risk Management
The third-party outsourcing trend will continue to grow in the coming years, which places third-party risk as a significant concern for organizations,…
Pursuing perfection takes a lot of resources, financially and people. In Cybersecurity risk management, there are two key questions:
Amid a global financial crisis and potentially facing cybersecurity budget challenges, you are now facing a tough decision; how to do more with less. What if I told you that you…
First, you must establish agreement among your leadership on the actual risk(s) to measure, then select which data will provide the most…
In a mission-based risk assessment, the question is, how do you perform one?
A four-layer approach will be a good start:
When measuring risk in your organization, you’ll typically discover two challenges: First, top key risk measures that do not have supporting data (aspirational). Second, you’ll …
There is a three-point framework to keep in mind when preparing a report to the Board, especially if you are a small to m…
How do you understand a digital asset's business value?
First, let’s define what a digital asset is; a digital asset is a system, process, data, and technology that is used. A cy…
NIST has developed a cybersecurity risk management framework that addresses the issue as a comprehensive process that requires organizations to: