2 minute, 30 second read. Welcome back to the CRO blog. Last week we continued our three-part discussion of Federal Trade Commission lawsuits and complaints. This week we’re diving into…
2 minute, 30 second read. Welcome back to the CRO blog. Last week we began a series of three blog posts by analyzing the first of three Federal Trade Commission…
3 minute read. Welcome back to the CRO blog. Last week we discussed incorporating data security standards in business contracts. This week we’ll shift our focus to how the Federal…
90 second read Last week we defined reasonable cybersecurity and what constitutes reasonable cybersecurity. This week we’re going to continue our discussion by redefining the way you think about cyber…
2 minute read Reasonable Cybersecurity is not a technological standard; it’s a legal and managerial standard. The nature of cyber threat is very intense. We see example after example…
Cybersecurity Is a Business Risk These days, I encourage organizations to manage cybersecurity as a business risk on par with sales, order fulfillment, and accounts receivable. This is because not…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section called “How to Measure Cyber Risks.” Last week, I…
Let’s continue with the discussion we started in last week’s blog about creating a score key for your experts. Once your score key is ready, prepare one questionnaire for each…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section I call “How to Measure Cyber Risks.” Last week,…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section I call “How to Measure Cyber Risks.” Now it’s…