The following is adapted from Fire Doesn’t Innovate. It seems like every day we hear news of a well-known company experiencing a data breach. Companies like Yahoo, Target, and Marriott…

We’re taking the next few weeks to address some important questions we receive at Cyber Risk Opportunities. If you have questions that you would like answered, please leave them in…

Over the last several weeks, I’ve been talking with a lot of middle market executives in the greater Seattle-area. These folks fit the profile of our potential customers: They’re senior…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section called “How to Measure Cyber Risks.” In a previous…
Over the next several posts on this blog, I’ll describe how to measure, understand, and manage cyber risks at an executive level. We’ll build on everything that we’ve covered so…
In last week’s blog, we introduced the idea of designing and building your cybersecurity program for risk management and compliance. Let’s continue with some examples. A Data Security Example To…
My previous blog posts in the series have led us to this next step: Designing and building your cybersecurity program to achieve both your cyber risk management and compliance goals….
Remember when Sarah Palin’s email account was hacked in late 2008? Here’s what Wired said about it: …the Palin hack didn’t require any real skill. Instead, the hacker simply reset…
Having chosen 1Password and made my initial configurations, I now use it in my daily workflow. Initially, this change wasn’t easy. But, Cyber Risk leaders need to be good at changing…