Risk Management

Risk Management | News, how-tos, features, reviews, and videos

CSO Hall of Fame 2021 [LOGO]
CSO > Invalidated cyber insurance

A laptop with a virtual overlay of abstract code and a binary skull.

Global trends will increase nation-state threats for the US in next 20 years

US intelligence agencies predict more nation-state-sponsored cyberattacks, disinformation campaigns, cyberespionage and intellectual property theft in the coming decades.

vcmar shira james copy
video

Strategies for elevating security to an evergreen business priority

PwC Chief Information and Technology Officer James Shira is an expert on managing security's big picture. With the growing focus on risk management from boards and senior leadership, James shares advice on keeping security and risk...

security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears

4 steps to better security hygiene and posture management

Increasing scale and complexity have made keeping up with security hygiene and posture management cumbersome and error prone, leaving organizations exposed. Here's what leading CISOs are doing to close the gap.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

4 ways to keep the cybersecurity conversation going after the crisis has passed

Executives and board members focus more on cybersecurity when there’s immediate danger. Here’s how CISOs can use a crisis like SolarWinds to translate security into business strategy.

social network of simple figures and their connections

Clubhouse app raises security, privacy concerns

It’s got $100 million, loads of personal data, questionable privacy practices, and no CSO: What enterprise security needs to know before employees join hot new social app Clubhouse.

CSO > cyber insurance / umbrella hub connected to connected devices and online activities

New York issues cyber insurance framework as ransomware, SolarWinds costs mount

The state looks to protect one of its core industries, which is threatened by mounting and potentially "unsustainable" losses due to the SolarWinds and ransomware attacks.

sing yell announce microphone boy shout communicate perform by jason rosewell unsplash

3 ways to speak the board's language around cyber risk

Framing the cyber risk conversation in ways that resonate with the board will help close the chasm between cyber risk and enterprise objectives.

programmer certification skills code devops glasses student by kevin unsplash

Top 10 in-demand cybersecurity skills for 2021

The list of needed security skills is long and growing. Here's what experts say is driving the demand.

supply chain management logistics - ERP - Enterprise Resource Planning

Protecting the supply chain in an era of disruptions

Supply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom.

cso information security policy risk management writing policy by metamorworks getty 2400x1600

2020 security priorities: Pandemic changing short- and long-term approaches to risk

The way organizations assess and respond to security risks will likely never be the same due to COVID, say respondents of a new IDG survey.

supply chain management connections - ERP - Enterprise Resource Planning

China’s exclusion from US 5G market likely to continue with Biden administration

Telecom insiders discuss supply chain security and call for better communication, collaboration, and transparency from the federal government about threats within their industry.

risk assessment - safety analysis - security audit

EU's DORA regulation explained: New risk management requirements for financial firms

The proposed Digital Operational Resilience Act includes new incident response and third-party risk requirements for financial firms operating within the EU. Passage is expected, so plan now.

Insider threats  >  Employees suspiciously peering over cubicle walls

Preventing insider threats: What to watch (and watch out) for

Understanding human behaviors that precede malicious actions from an insider is the best way to avoid data loss or disruption, experts say.

business leadership / double-exposure of a woman with laptop and phone, city skyline + abstract data

10 value-adds that CISOs can deliver

Savvy security chiefs are generating returns for their organizations beyond enabling secure business operations. Here's how they do it.

hovering drone / camera / propellor blades

How drones affect your threat model

As use of unmanned aerial vehicles grows, organizations should have a plan for managing the risk associated with drones, whether or not they deploy them, experts say.

An empty office has been cleared out with only a moving box remaining.

7 steps to securely shutting down business units

Closing down parts or all of a business involves more than just decommissioning IT assets. CISOs must lead a holistic effort to ensure data and access aren’t left exposed.

Scissors cutting through a hundred-dollar United States banknote

5 tips for cutting budgets in a crisis without hurting security

Sudden budget cuts like those businesses are facing due to the COVID crisis can have long-term negative effects on security. Here's how to trim costs and keep a positive future.

cso information security policy risk management writing policy by metamorworks getty 2400x1600

Revised DOJ compliance guidance offers risk-management lessons for cybersecurity leaders

Prosecutors use this guidance to assess criminal liability in a compliance breach, so it behooves business and security leaders to understand the expectations.

Load More
You Might Also Like