Digital Transformation: Balancing Speed, Security and Innovation

Today, digital transformation (DX) is happening in every industry. Organizations operating in sectors that typically eschew technology are moving to the cloud, leveraging IoT and using analytics. Digital transformation plays a critical role for any company to stay competitive and resilient. But what does digital transformation look like for most companies, and more importantly, how […]

The post Digital Transformation: Balancing Speed, Security and Innovation appeared first on Security Intelligence.

Continue reading Digital Transformation: Balancing Speed, Security and Innovation

Changing the Conversation with Risk Quantification

“Quantitative risk analysis is the single most effective way to align security with business priorities and establish credibility with teams.” — U.S.-based CISO As organizations continue to leverage the latest technologies and move toward even greater interconnectivity in the pursuit of growth, business strategy and cybersecurity continue to converge. Cybersecurity concerns now extend beyond the […]

The post Changing the Conversation with Risk Quantification appeared first on Security Intelligence.

Continue reading Changing the Conversation with Risk Quantification

Risk Management: How Security Can Learn to Do the Math

Risk management is an important element in using data to get ahead of cybersecurity risks before they happen. The costs of protecting an enterprise of any size against cyber attacks continue to rise. Once a business truly understands the consequences of an incident, its leaders must decide how to manage the risk. They can choose to […]

The post Risk Management: How Security Can Learn to Do the Math appeared first on Security Intelligence.

Continue reading Risk Management: How Security Can Learn to Do the Math

The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation

In today’s rapidly evolving security environment, it’s imperative for organizations to establish a formal data risk management program that does more than just check the boxes.

The post The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation appeared first on Security Intelligence.

Continue reading The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation

The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.

The post The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework appeared first on Security Intelligence.

Continue reading The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model

The Three Lines of Defense model enables board directors to be involved in the cyber risk management process without micromanaging the security team.

The post Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model appeared first on Security Intelligence.

Continue reading Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model