What is Cyber Risk?

Security Boulevard

The post What is Cyber Risk? The post What is Cyber Risk? CISO Suite Governance, Risk & Compliance Security Bloggers Network Cybersecurity Other risk managementThe discouraging numbers continue to grow as the latest high-profile breaches make headlines.

Moody’s to Include Cyber Risk in Credit Ratings

Adam Levin

The American business and financial services company Moody’s will start factoring risk of getting hacked into their credit ratings for companies. The move is seen as part of a wider initiative to gauge the risk of cyberattacks and data breaches to companies and their investors. “We’ve We’ve been in the risk management business for a very long time. The post Moody’s to Include Cyber Risk in Credit Ratings appeared first on Adam Levin.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Top 5 Cyber Risk Questions Board Members Ask Axio

Security Boulevard

Executive Summary Board Members Request Business-Centric Cyber Risk Reporting Recently, our board member customers have expressed great interest in understanding cyber risk in business terms. Security Bloggers Network cyber-risk

Digital Transformation Frameworks for Cyber Risk Teams

Security Boulevard

The post Digital Transformation Frameworks for Cyber Risk Teams appeared first on Security Boulevard. Businesses are embracing digital transformation to drive agility and ensure their success in a digital-first economy.

What is cyber risk quantification, and why is it important?

Tech Republic Security

One way to get C-level managers and cybersecurity department heads on the same page is to employ cyber risk quantification, as it speaks to costs versus risks

How Digital Transformation Impacts IT And Cyber Risk Programs

Security Boulevard

The post How Digital Transformation Impacts IT And Cyber Risk Programs appeared first on Security Boulevard. The rise of smart devices and changing customer preferences have kicked global digital transformation into full gear.

The Cyber Risks of Transportation’s Connected OT/IoT Systems

Security Boulevard

The post The Cyber Risks of Transportation’s Connected OT/IoT Systems appeared first on Nozomi Networks. The post The Cyber Risks of Transportation’s Connected OT/IoT Systems appeared first on Security Boulevard.

Accellion data breach highlights third party cyber risk

Security Boulevard

Two mega-breaches caused by third parties have occurred over the last month, adding to the recent Solarwinds epic supply chain hack, to create a growing tsunami of third party risk for enterprises and government organizations.

Ask the Expert: Why is it critical that organization mature their cyber risk program now?

Security Boulevard

Kirk Hogan, Iceberg Networks and Bill Vollono, Recorded Future sat down to discuss how the pandemic is having an effect on cyber risk programs. The post Ask the Expert: Why is it critical that organization mature their cyber risk program now?

3 ways to speak the board's language around cyber risk

CSO Magazine

The days of a hopeless disconnect between security leaders and the board of directors have come to a close—at least for enterprises with a healthy risk posture.

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production.

Watch Out for These Cyber-Risks

Dark Reading

It's difficult to predict what will materialize in the months ahead in terms of cyber-risks, which is why it's wise to review your organization's security posture now

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

The Last Watchdog

As jarring as this abrupt shift to remote work has been for countless companies, government agencies and educational institutions, it has conversely been a huge boon for cyber criminals. Thus the urgency for organizations to put all excuses aside and embrace stricter cyber hygiene practices could not be any higher. All year now they’ve been stepping up cyber attacks that leverage and/or exploit the notoriety of the global pandemic in one way or another.

Despite Heightened Cyber-Risks, Few Security Leaders Report to CEO

Dark Reading

A new report suggests that top management at most companies still don't get security

Third-Party Cyber-Risk by the Numbers

Dark Reading

Recent stats show that the state of third-party cyber-risk and vendor risk management remains largely immature at most organizations

Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber Risk

The Security Ledger

In this interview, Camille Stewart, Google’s Head of Security Policy for Google Play and Android explains how understanding how systemic racism influences cyber security is integral to protecting the American people and defending the country from cyber adversaries.

Why Cyber-Risk Is a C-Suite Issue

Dark Reading

Organizations realize the scale of cyber-risk but lack counter-actions to build resilience

How do cyber risk ratings need to evolve?

SC Magazine

The post How do cyber risk ratings need to evolve? Security ratings are often a controversial topic for businesses. Some claim these platforms are not ready for the open market. So how should the cybersecurity community view these offerings?

The Case for Cyber-Risk Prospectuses

Threatpost

Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.

Update: DHS Looking Into Cyber Risk from TCL Smart TVs

The Security Ledger

Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The acting head of the U.S.

DHS Looking Into Cyber Risk from TCL Smart TVs

The Security Ledger

Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The acting head of the U.S.

How Smart Organizations Mitigate Cyber Risks in a World of Unknown Unknowns

CyberSecurity Insiders

By Shay Siksik, VP Customer Operations and CISO, XM Cyber. We call these things “unknown unknowns” — and they are the most challenging to deal with from the perspective of risk management and cybersecurity. Managing Risk in a World of Unknown Unknowns.

The 2020 Cyber Risk Index Goes Global

Trend Micro

I’m excited this year to share the most recent version of the Trend Micro Cyber Risk Index (CRI), which we started 3 years ago. Privacy & Risks Expert Perspective Endpoints Articles, News, Reports Cyber Threats Cloud

How to find, fund and fix cyber risk blind spots

SC Magazine

Today’s columnist, Sean McDermott of RedMonocle, says that companies should use the NIST 800-53 security and privacy controls to help find cyber risk blind spots. The rapid, overnight shift exposed new cyber risk blind spots and gaps unknown to security leaders or executive teams.

CISO 60

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

The Last Watchdog

So they began inundating their third-party suppliers with “bespoke assessments” – customized cyber risk audits that were time consuming and redundant. Out of that morass was born CyberGRX , a Denver, CO-based start-up that’s seeking to dramatically streamline third-party risk assessments, and actually turn them into a tool that can help mitigate cyber exposures. The CSOs couldn’t scale their third-party risk assessment programs to keep up with growth.

Cyber-Risks Hiding Inside Mobile App Stores

Dark Reading

As the number of blacklisted apps on Google Play continues to drop, attackers find new ways to compromise smartphones

Prevent Cyber Risk as a Managed Service Provider (MSP)

Trend Micro

Cloud Cyber Threats APT & Targeted Attacks Endpoints Ransomware Network Security Strategies Articles, News, ReportsMSPs – Say no to the next Ransomware! Protect your Business 24x7 with Trend Micro’s security analysts.

Ransomware: A Deep Dive into 2021 Emerging Cyber-Risks

Threatpost

Our new eBook goes beyond the status quo to take a look at the evolution of ransomware and what to prepare for next. Cloud Security Critical Infrastructure eBook Government IoT Malware Web Security

Close the Gap Between Cyber-Risk and Business Risk

Dark Reading

Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Related: The case for quantifying cyber risks The most important factor that should be taken into account is a security risk assessment. If risks are not properly assessed, providing security becomes tedious. Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization.

Cyber-Risks Explode With Move to Telehealth Services

Dark Reading

The hasty shift to online delivery of primary care services since the COVID-19 outbreak has attracted significant attacker interest

Working at a safe distance, safely: Remote work at industrial sites brings extra cyber risk

Tech Republic Security

When workers need to get things done in a dangerous locale, sometimes they have to be distant. This opens up plenty of cybersecurity hazards. We spoke with one expert about how to achieve that security

Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture

The Security Ledger

A coordinated cyber attack on U.S. In just the past four months, the United States has contended with a major escalation of cyber risk in critical infrastructure with two, major attacks that disrupted critical sectors. Cyber Risk Alert: Critical Infrastructure Attacks Are Here.

BrandPost: Announcing HP Wolf Security, and a New Report Assessing Remote Working Cyber Risks

CSO Magazine

HP recently announced the findings of a new report – Blurred Lines & Blindspots – a comprehensive global study assessing organizational cyber risk in an era of remote work.

Quantifying Cyber Risk: Why You Must & Where to Start

Dark Reading

Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them

Episode 195: Cyber Monday Super Deals Carry Cyber Risk

The Security Ledger

The post Episode 195: Cyber Monday Super Deals Carry Cyber Risk appeared first. Between Black Friday and Cyber Monday, consumers across the U.S. But what about cyber security? Episode 170: Cyber Monday is for Hackers.

Manufacturing’s Cloud Migration Opens Door to Major Cyber-Risk

Threatpost

New research shows that while all sectors are at risk, 70 percent of manufacturing apps have vulnerabilities. Cloud Security Critical Infrastructure Mobile Security Vulnerabilities Web Security

Free Mobile App Measures Your Personal Cyber Risk

Dark Reading

New app for Android and Apple iOS uses an algorithm co-developed with MIT to gauge security posture on an ongoing basis

Mitigating Cyber-Risk While We're (Still) Working from Home

Dark Reading

One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers

Hardening the Physical Security Supply Chain to Mitigate the Cyber-Risk

Dark Reading

Nick Smith, Regional Manager at Genetec, details how physical security professionals can improve their resilience to cyberattacks by reviewing the cybersecurity policies of those they work with in the supply chain. This includes everyone from component vendors to installers and engineers

7 Insights About Managing Cyber Risk You Can’t Afford To Miss

Jane Frankland

trillion in global value will be at risk from cyberattacks. Data is a strategic asset for any business and any hacker, so when it comes to protecting an organisation from cyberattacks and compliance failures, one of the most common problems I see is the ability of leaders to identify the risks they face, as well as evaluating, communicating, and tackling them in a timely fashion. Most organisations don’t define what risk means to them, which ironically is a threat.

Public companies may not grasp responsibility to investors in sharing info on cyber risk

SC Magazine

Publicly traded companies must start disclosing more “actionable” information to shareholders and regulators around their cyber risks and vulnerabilities. Many executives themselves might not fully understand their own risks.

Third Party Cyber Risk is growing. Most Companies aren’t prepared.

The Security Ledger

Third party cyber risk is a growing concern for organizations, as breaches and hacks tied to third party providers and applications multiply. How do you know if your third party cyber risk management program is up to the task? CyberGRX Reports Risk risk management risk rating supply chain third party Top Stories cyber risk eBook reports third-party