Nearly 20 percent of this year’s CSO50 Award winners took on security risk and compliance projects. Download the CSO50 2018 digital issue to read their stories, as well as descriptions of all 50 winning projects. Credit: IDG/Thinkstock Risk. Some might call it the new four-letter word in security. Security risk seems to increase in lock step with every new technology innovation, business development and threat actor discovered. Today, company data resides in the cloud, on mobile devices and is connected to the internet of things (IoT). Threat vectors are multiplying, threatening firms’ operations, customers and future financial stability.The World Economic Forum ranked cyber attacks as the 12th largest risk to doing business in 2017, ahead of natural catastrophes, which ranked 20th.What’s more, security leaders are constantly challenged to communicate ever-changing security risks to executives and the board of directors, and to deal with the fallout should the risk exceed their appetite.Nearly 20 percent of this year’s CSO50 Award winners took on security risk and compliance projects — tackling security risk associated with outsider threats, third-party vendors, medical devices, compliance and keeping university systems open but safe for thousands of students. To read their stories, and descriptions of all 50 winning projects, click on the link below and download the CSO50 2018 digital issue. download CSO50 2018: Taking security risk management to new heightsCSO Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe