2 minute read. Last week we broke down the life cycle of cyber risk management by defining the following five functions: identify, protect, detect, respond, and recover. Today we’re going to…
90 second read Today we are continuing our discussion on reasonable cybersecurity by breaking down the life cycle of cyber risk management. The life cycle can be broken down to…
Kip Boyle and Jake Bernstein describe “active defense” as an emerging technique for dealing with cyber-attackers and the legality of the various methods.
90 second read Last week we defined reasonable cybersecurity and what constitutes reasonable cybersecurity. This week we’re going to continue our discussion by redefining the way you think about cyber…
2 minute read Reasonable Cybersecurity is not a technological standard; it’s a legal and managerial standard. The nature of cyber threat is very intense. We see example after example…
Kip Boyle and Jake Bernstein explain how you need to use people, process, and management (in addition to technology) in order to have reasonable cybersecurity.
Cybersecurity Is a Business Risk These days, I encourage organizations to manage cybersecurity as a business risk on par with sales, order fulfillment, and accounts receivable. This is because not…
Most executives want to be better cyber risk managers. They want to manage cybersecurity risks in the same thoughtful and intelligent way as they manage other aspects of their business….
Kip Boyle and Jake Bernstein discuss whether organizations should pay a ransom to regain control over their data and systems.
10 Fastest Growing Risk Management Solutions The Technology Headlines is a knowledge platform for industry leaders and professionals to share their experiences, ideas and advice within the enterprise. Recently the…