Cybersecurity Is a Business Risk These days, I encourage organizations to manage cybersecurity as a business risk on par with sales, order fulfillment, and accounts receivable. This is because not…
In previous posts, I’ve explained how cybercrime is big business, and the criminals behind the illegal activity run sophisticated online companies. Today, let’s begin talking about how to defend your…
In recent weeks I’ve been talking about the millennial mobster and the reality that savvy international businesses make up the majority of cybercriminals. This blog post is the final week…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section called “How to Measure Cyber Risks.” Last week, I…
Let’s continue with the discussion we started in last week’s blog about creating a score key for your experts. Once your score key is ready, prepare one questionnaire for each…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section I call “How to Measure Cyber Risks.” Last week,…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section I call “How to Measure Cyber Risks.” Now it’s…
Using our semi-formal, semi-quantitative approach, we’ll need a way to measure cyber risk in order to use data to manage it. Managerial Approach Because we’re taking a managerial approach to…
An essential function of a cybersecurity program is the management of cyber risk. You’ll manage it on a daily basis as part of the operational functions and projects your team…
Over the next several posts on this blog, I’ll describe how to measure, understand, and manage cyber risks at an executive level. We’ll build on everything that we’ve covered so…