article thumbnail

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

The Last Watchdog

The Internet Security Alliance ( ISA ) is a trade association and think tank whose members include prominent corporations in a wide cross section of industries. In February, ISA, in partnership with the National Association of Corporate Directors ( NACD ), published the 2020 edition of their Cyber-Risk Oversight Handbook for Corporate Boards.

article thumbnail

How Diversity and Inclusion Initiatives Can Reduce Cyber Risk

Centraleyes

In the aftermath of the national reckoning on racial justice ignited by the tragic events involving George Floyd, it became evident that despite good intentions, the cybersecurity sector had not tackled the field’s predominantly white and male composition. User-Centric Design Poor user decisions often exacerbate cyber risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

Ambiguity about cyber security threats, legal responsibilities, and unexpected events is exacerbated for IT security professionals who don’t understand where resources are positioned, how well they are handled, or whether they are susceptible. . . Respond fast to incidents via IT experts. . Conclusion.

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. Related: Good to know about IoT Physical security is often a second thought when it comes to information security.

article thumbnail

Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber Risk

The Security Ledger

Here’s the deal with the information security industry in the United States: our country doesn’t have nearly the number of information security professionals that it needs. According to an estimate from Cybersecurity Ventures, the shortage of US cyber security workers could reach 500,000 people in 2021.

article thumbnail

How Do You Quantify Risk? Best Techniques

Centraleyes

Enter the need for a more precise and actionable approach — Cyber Risk Quantification. This blog aims to serve as a guide to navigating the intricate terrain of cyber risk quantification, providing insights into its significance, methodologies, and the transformative impact it can have on organizational cybersecurity strategies.

Risk 52
article thumbnail

Six strategic cyber investments for the next six months – and beyond

CyberSecurity Insiders

We are also now seeing the proliferation of weaponized cyberattacks in the face of geopolitical events. This new era of attacks demonstrate that the cyber landscape will never be the same. Real-time cyber risk monitoring enables firms to protect their most sensitive data and safeguard against internal and external threats.