2 minute, 30 second read. The rise of three great forces is shaping the cyber world today: Cyber-attackers, Amazon, and the government institutions that citizens rely upon for protection. All…
2 minute, 30 second read. Welcome back to the CRO blog. Last week we continued our three-part discussion of Federal Trade Commission lawsuits and complaints. This week we’re diving into…
2 minute, 30 second read. Welcome back to the CRO blog. Last week we began a series of three blog posts by analyzing the first of three Federal Trade Commission…
3 minute read. Welcome back to the CRO blog. Last week we discussed incorporating data security standards in business contracts. This week we’ll shift our focus to how the Federal…
2 minute read. Last week we broke down the life cycle of cyber risk management by defining the following five functions: identify, protect, detect, respond, and recover. Today we’re going to…
90 second read Today we are continuing our discussion on reasonable cybersecurity by breaking down the life cycle of cyber risk management. The life cycle can be broken down to…
90 second read Last week we defined reasonable cybersecurity and what constitutes reasonable cybersecurity. This week we’re going to continue our discussion by redefining the way you think about cyber…
2 minute read Reasonable Cybersecurity is not a technological standard; it’s a legal and managerial standard. The nature of cyber threat is very intense. We see example after example…
Cybersecurity Is a Business Risk These days, I encourage organizations to manage cybersecurity as a business risk on par with sales, order fulfillment, and accounts receivable. This is because not…
Most executives want to be better cyber risk managers. They want to manage cybersecurity risks in the same thoughtful and intelligent way as they manage other aspects of their business….