Why chasing risk assessments will have you chasing your tail

Third-party risk assessments are often described as time-consuming, repetitive, overwhelming, and outdated. Think about it: organizations, on average, have over 5,000 third parties, meaning they may feel the need to conduct over 5,000 risk assessments…. Continue reading Why chasing risk assessments will have you chasing your tail

Digital Transformation and Risk Management Must Go Together

The recent PwC 2022 Global Risk Survey gives a glimpse into what senior leaders think about their business efforts. The report opens with some expected highlights worth repeating:  Change is increasingly fast and disruptive The COVID-19 pandemic caused disturbances in the labor and supply markets Geopolitical risk is on the rise New regulations, including an […]

The post Digital Transformation and Risk Management Must Go Together appeared first on Security Intelligence.

Continue reading Digital Transformation and Risk Management Must Go Together

How to set up a powerful insider threat program

Security spend continues to focus on external threats despite threats often coming from within the organization. A recent Imperva report (by Forrester Research) found only 18 percent prioritized spend on a dedicated insider threat program (ITP) compare… Continue reading How to set up a powerful insider threat program

The changing role of the CCO: Champion of innovation and business continuity

In this interview with Help Net Security, Simon Winchester, VP Worldwide Advanced Technologies at Jumio, talks about the changing role of the chief compliance officer (CCO) and how to alleviate some of its burdens in today’s highly regulated worl… Continue reading The changing role of the CCO: Champion of innovation and business continuity

The benefits of cyber risk quantification in the modern cybersecurity landscape

Kovrr and SANS Institute released their joint survey that reveals enterprise motivation and impact of cyber risk quantification (CRQ) in the modern cybersecurity landscape. CRQ helps businesses evaluate the potential financial impact of cyber events on… Continue reading The benefits of cyber risk quantification in the modern cybersecurity landscape

Navigating data privacy in the higher education ecosystem

The need for academic institutions to become data privacy advocates is paramount. Over the past 24 months, higher education institutions have accelerated digital transformation initiatives. While that transformation has been underway for some time, the… Continue reading Navigating data privacy in the higher education ecosystem

Log4j exploitation risk is not as high as first thought, cyber MGA says

When the Log4Shell vulnerability (CVE-2021-44228) was publicly revealed in December 2021, CISA Director Jen Easterly said that it is the “most serious” vulnerability she has seen in her decades-long career and it could take years to address. It’s… Continue reading Log4j exploitation risk is not as high as first thought, cyber MGA says

Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource

The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the enterprise, armed with more resources, could sustain the shock. […]

The post Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource appeared first on Security Intelligence.

Continue reading Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource

Changing the Conversation with Risk Quantification

“Quantitative risk analysis is the single most effective way to align security with business priorities and establish credibility with teams.” — U.S.-based CISO As organizations continue to leverage the latest technologies and move toward even greater interconnectivity in the pursuit of growth, business strategy and cybersecurity continue to converge. Cybersecurity concerns now extend beyond the […]

The post Changing the Conversation with Risk Quantification appeared first on Security Intelligence.

Continue reading Changing the Conversation with Risk Quantification