article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments.

CSO 59
article thumbnail

Does Cyber Risk Quantification Work? | Avast

Security Boulevard

Cyber strategist Pete Lindstrom maintained in an article on CSO that cybersecurity risk is constantly changing in a way analogous to the probability odds in a March Madness tournament. The post Does Cyber Risk Quantification Work? Avast appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: An Intelligent Way to Monitor and Manage Your Cyber Risks

CSO Magazine

Cyber risks, especially those emanating from third and fourth parties, are escalating. Yet gaining a clear picture of these risks is much more complex given interwoven ecosystem dependencies, data sitting in silos, and many organizations’ lack of a security mindset. “We

article thumbnail

CISO’s Guide to Presenting Cybersecurity to Board Directors

CyberSecurity Insiders

Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. One key aspect of successful communication is understanding the business objectives and risk appetite of the organization.

article thumbnail

3 ways to speak the board's language around cyber risk

CSO Magazine

The more digital the business becomes, the more cybersecurity becomes an existential issue to address, impacting the competitiveness, continuity, reliability, and overall trust of the enterprise.

article thumbnail

Measuring cybersecurity: The what, why, and how

CSO Magazine

A core pillar of a mature cyber risk program is the ability to measure, analyze, and report cybersecurity threats and performance. That said, measuring cybersecurity is not easy. What can be measured in cybersecurity? To read this article in full, please click here

article thumbnail

6 steps for third-party cyber risk management

CSO Magazine

A recent survey by security vendor Anchore found that in the past 12 months, 64% of businesses experienced a supply chain attack, and this year supplier attacks are expected to quadruple , according to the European Union Agency for Cybersecurity. To read this article in full, please click here