Re-evaluating immature and ineffective insider risk management programs

Managing insider risk is becoming increasingly difficult. In fact, insider risk is emerging as one of the most challenging threats to detect, mitigate and manage, according to Code42. Although more than 72% of companies indicate they have an Insider Ri… Continue reading Re-evaluating immature and ineffective insider risk management programs

Ask the Expert: How has third-party risk changed in the last year?

Dawn Ward, Senior Solution Consultant at Iceberg Networks and Chris Murphey, VP Advisory Services at Iceberg Networks, discuss how the third-party risk landscape has evolved in the last year. The following is an edited transcript of the conversation. D… Continue reading Ask the Expert: How has third-party risk changed in the last year?

Upcoming Discussion: A Risk-Based Approach to Bridging the Energy Sector Security Gap

Wednesday June 30, 2021 11 AM PST / 2 PM EST NERC has recently partnered with the Department of Energy (DOE) to expand the Cybersecurity Risk Information Sharing Program (CRISP) to include operational technology. The program is aimed at protecting the … Continue reading Upcoming Discussion: A Risk-Based Approach to Bridging the Energy Sector Security Gap

Pandemic accelerating need for insider risk management

As companies exit the pandemic, security leaders will be challenged with new data security complexities. Remote work over the past year magnified challenges that companies face around protecting data exposure and file exfiltration from insider risk, an… Continue reading Pandemic accelerating need for insider risk management

The Impact of Digital Transformation in the Public Sector

Today?s government organizations continue to modernize how they deliver services to constituents and deliver mission outcomes with technology. But as digital transformation increasingly defines the work of government today, risk management teams must r… Continue reading The Impact of Digital Transformation in the Public Sector

What Makes a Digital Risk Management Program?

Digital transformation needs a strategy to get your business to where it is wants to go, on time and safely. Like a good transit system, a Digital Risk Management program must be reliable, convenient and prepared for anything.
The post What Makes a Dig… Continue reading What Makes a Digital Risk Management Program?

The DRMTA: Loops and Lines

The loops and lines Digiville?s Digital Risk Management Transit Authority (DRMTA) represent key elements of a risk and security management program. As your organization expands its digital transformation, your program must evolve, growing tighter and m… Continue reading The DRMTA: Loops and Lines

Most decision makers expect AI and 5G to impact their cybersecurity strategy

An overwhelming majority of cybersecurity and risk management leaders believe that developments in 5G wireless technology will create cybersecurity challenges for their organizations. Their top three 5G-related concerns are greater risk of attacks on I… Continue reading Most decision makers expect AI and 5G to impact their cybersecurity strategy

Exploring Digiville with the DRMTA

Digiville, a metaphorical city representing the modern, digital enterprise, requires a top-notch transit system. The DRMTA of Digiville provides convenient, efficient transportation illustrating how risk management and security strategies must intersec… Continue reading Exploring Digiville with the DRMTA

Digital Risk: Don?t Believe the Myths Misconceptions

Today?s organizations face a new litany of risks related to digital business. Defining ?digital risk? too narrowly leads to myths and misconceptions that may not truly reveal the impact of digital transformation to operational and strategic risk.
The p… Continue reading Digital Risk: Don?t Believe the Myths Misconceptions