Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

Organizations that follow both the COSO enterprise risk management framework and the NIST CSF can vastly improve their cyber risk oversight and management.

The post Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges appeared first on Security Intelligence.

Continue reading Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

Things to Consider When Calculating the Return on Security Investment

The return on security investment is a crucial calculation to help CISOs demonstrate risks in business terms and gain executive buy-in for security tools.

The post Things to Consider When Calculating the Return on Security Investment appeared first on Security Intelligence.

Continue reading Things to Consider When Calculating the Return on Security Investment

The Benefits of Operational Risk Management

Operational risk management can help organizations measure the cost of network security solutions versus the cost of a potential data breach.

The post The Benefits of Operational Risk Management appeared first on Security Intelligence.

Continue reading The Benefits of Operational Risk Management

Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction

The new COSO enterprise risk management framework offers business leaders a road map to more effectively assess, manage, review and report on cyber risks.

The post Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction appeared first on Security Intelligence.

Continue reading Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction

What Does Secure Digital Transformation Mean to You?

A secure digital transformation requires open lines of communication and collaboration between line of business executives and security leaders.

The post What Does Secure Digital Transformation Mean to You? appeared first on Security Intelligence.

Continue reading What Does Secure Digital Transformation Mean to You?

Infusing New Perspectives Into the Cybersecurity Workforce With a New Collar Approach

A great way to bolster the dwindling cybersecurity workforce is to hire professionals who lack technical degrees but offer fresh perspectives.

The post Infusing New Perspectives Into the Cybersecurity Workforce With a New Collar Approach appeared first on Security Intelligence.

Continue reading Infusing New Perspectives Into the Cybersecurity Workforce With a New Collar Approach

Aspects of Security We Need to Be Thankful For

With the seemingly perpetual negativity surrounding security, there’s still a lot to be thankful for and admire in today’s environment.

The post Aspects of Security We Need to Be Thankful For appeared first on Security Intelligence.

Continue reading Aspects of Security We Need to Be Thankful For

Quit Your Day Job: Filling the Cybersecurity Skills Gap With Freelance Security Professionals

Hiring freelancers can help companies close the cybersecurity skills gap, reduce overhead and infuse a fresh perspective into the organizational culture.

The post Quit Your Day Job: Filling the Cybersecurity Skills Gap With Freelance Security Professionals appeared first on Security Intelligence.

Continue reading Quit Your Day Job: Filling the Cybersecurity Skills Gap With Freelance Security Professionals

Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model

The Three Lines of Defense model enables board directors to be involved in the cyber risk management process without micromanaging the security team.

The post Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model appeared first on Security Intelligence.

Continue reading Take a Load Off: Delegate Cyber Risk Management Using the Three Lines of Defense Model

Overcoming Common Roadblocks on Your Digital Transformation Journey

Companies that impact cultural change, keep their systems up to date and retain cyber talent have a leg up when it comes to digital transformation.

The post Overcoming Common Roadblocks on Your Digital Transformation Journey appeared first on Security Intelligence.

Continue reading Overcoming Common Roadblocks on Your Digital Transformation Journey