Feeling overwhelmed by cyber risk? You're not alone. In today's digital world, cyber threats are a complex issue and a strategic opportunity to strengthen your organization's resilience.
This podcast dives deep into the world of cyber governance and risk management. We'll have open conversations with experts to help you take your organization's cybersecurity posture from "as-is" to the next level.
Here's what you'll learn:
Join us and learn how to navigate the ever-evolving cyber landscape with confidence.
There are many stakeholders in cybersecurity, and it makes sense to outline roles and responsibilities in terms of how each role impacts cyber resiliency.
The initial public draft of NIST IR 8286D provides comprehensive asset confidentiality and integrity impact analyses to accurately identify and manage asset risk propagation fro…
Three common pitfalls of cybersecurity or risk frameworks:
There are several measurements or metrics an organization can put in place to monitor; some of them can be turned into Key Risk Indicators (KRIs) and Key Performance Indicators …
These 3 steps you can take to perform a risk assessment:
What to Focus on FIRST
Mission-based cybersecurity
Prioritizing remediation is based …
There are some simple rules that you can start today to ensure improvements to your cyber risk program.
Today I’ll discuss risk probability and impact and give you some examples to build your own impact and probability table.
Thanks.
Dr. Bill Souza
CEO/Founder
E|CE - …
Today I’ll touch on the topic of Cyber Risk & Cyber Investment challenges.
Thanks.
Dr. Bill Souza
CEO/Founder
E|CE - Executiv…
The show today is based on an article titled, “Global utilities lacking basic cybersecurity practices.” Although the article was focused on utilities, the guidance is applicable…
We are so focused on the threats and the vulnerabilities that allowed a hack to occur, that we forget the basics. The protection necessary to prevent or slow down these attacks …
In today's episode, I will discuss exceptions tracking and expirations. This is the last episode in a three-part series on cybersecurity standard exceptions.
Thanks.
Dr. Bill Souz…
As I mentioned in my previous episode, there’s much more to discuss on cybersecurity exceptions, such as the risk they pose to the organization and the hidden dangers of cumulat…
If your cybersecurity standards were written to protect the organization, why do you have security exceptions? Your standard development team writes an excellent standard; it fo…
Asset classification is the foundation of everything else to come in cybersecurity; it will help your organization, for example, small or large, to better understand, manage, id…
In this episode, I will discuss three challenging areas where cybersecurity education is falling short in preparing students and professionals to succeed in the field.
In this episode, I discuss how to leverage your risk framework to make sound cybersecurity investment decisions. I addressed two critical questions that you will need to know th…
To get results you need to ask the right question, collect the data, analyze, and develop a robust and factual interpretation. This episode will guide you through the thought pr…
Today’s episode I will discuss a strategy to identify critical systems in your organization. The steps I will discuss today will make sure your program is objective and repeatab…
Today’s episode we will discuss how to identify KRIs (key risk indicators). I’ll discuss a simple and effective way to do it; there seems to be a lot of confusion on what to mea…