
All Episodes
Episodes
Cybersecurity Risk Management - Physical Devices
Cybersecurity Risk Management - Physical DevicesThe risk management process entails four fundamental concepts, which can be further broken down; however, the fundamental concepts are: Frame riskAssess riskRespond to...
View Episode
Questions Boards Should Ask
Questions Boards Should AskThe challenge for directors or investors is determining the organizational overall cybersecurity maturity relative to the risk. The board of directors, in particular, has an oversight...
View Episode
Cybersecurity Confidence vs Performance
Cybersecurity Confidence vs. PerformanceSeveral studies conducted in other fields showed how spending effort on analysis improved confidence even when the actual performance was not improved. A study by the University...
View Episode
The MOST Important Cybersecurity Principle
Asset management is most commonly associated with cybersecurity hygiene, which is associated with patching, anti-virus, access control, and other asset-specific protections. However, there are three NIST CSF...
View Episode
5 Focus Areas - Third-Party Risk Measurements
There are two types of third-party risk: product vendors and service providers. Product vendors outsource software, platform, and infrastructure, known as SaaS, PaaS, and IaaS. According to some estimates, only 40% of...
View Episode
5 Must-Have Cybersecurity Strategies for Small Businesses
Cyber attacks targetting small businesses that often do not have the resources to defend against devastating attacks like ransomware have grown. As a small business CEO or CIO, you have likely come across outdated...
View Episode
Third-Party Risk Management
Third-Party Risk ManagementThe third-party outsourcing trend will continue to grow in the coming years, which places third-party risk as a significant concern for organizations, large or small. Depending on which...
View Episode
Chasing Perfection
Chasing PerfectionPursuing perfection takes a lot of resources, financially and people. In Cybersecurity risk management, there are two key questions: When will enough be enough? What is the correct amount of time and...
View Episode
Cybersecurity Risk & Budget Challenges
Amid a global financial crisis and potentially facing cybersecurity budget challenges, you are now facing a tough decision; how to do more with less. What if I told you that you can; change the focus of your...
View Episode
5 Rules for Cybersecurity Risk Metrics
Rules for Effective Cybersecurity MetricsFirst, you must establish agreement among your leadership on the actual risk(s) to measure, then select which data will provide the most accurate representation of the risk.The...
View Episode
Mission-Centric Risk Assessment - Preparation
Mission Centric Risk AssessmentIn a mission-based risk assessment, the question is, how do you perform one? A four-layer approach will be a good start: Mission layerOperational layerApplication layerInfrastructure...
View Episode
Top 2 Measurement Challenges
When measuring risk in your organization, you’ll typically discover two challenges: First, top key risk measures that do not have supporting data (aspirational). Second, you’ll be developing middle to low measures...
View Episode