I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section called “How to Measure Cyber Risks.” In a previous…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section called “How to Measure Cyber Risks.” Last week, I…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section called “How to Measure Cyber Risks.” Last week, I…
Let’s continue with the discussion we started in last week’s blog about creating a score key for your experts. Once your score key is ready, prepare one questionnaire for each…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section I call “How to Measure Cyber Risks.” Last week,…
I’m continuing my long series of posts that describe how to implement an information security program. Currently, we’re in the section I call “How to Measure Cyber Risks.” Now it’s…
Using our semi-formal, semi-quantitative approach, we’ll need a way to measure cyber risk in order to use data to manage it. Managerial Approach Because we’re taking a managerial approach to…
An essential function of a cybersecurity program is the management of cyber risk. You’ll manage it on a daily basis as part of the operational functions and projects your team…
Over the next several posts on this blog, I’ll describe how to measure, understand, and manage cyber risks at an executive level. We’ll build on everything that we’ve covered so…
In last week’s blog, we introduced the idea of designing and building your cybersecurity program for risk management and compliance. Let’s continue with some examples. A Data Security Example To…