What is Cyber Risk?

Security Boulevard

The post What is Cyber Risk? The post What is Cyber Risk? CISO Suite Governance, Risk & Compliance Security Bloggers Network Cybersecurity Other risk managementThe discouraging numbers continue to grow as the latest high-profile breaches make headlines.

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Such a transformation however, comes with its own set of risks. Misleading information has emerged as one of the leading cyber risks in our society, affecting political leaders, nations, and people’s lives, with the COVID-19 pandemic having only made it worse. Misleading information – comprised of the three horseman of cyber risks: misinformation, disinformation, and fake news — also affects something we rarely stop to consider: business. Industry 4.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Security teams report rise in cyber risk

CSO Magazine

If you are like 80% of respondents to the Trend Micro’s biannual Cyber Risk Index (CRI) report, you expect to experience a data breach that compromises customer data in the next 12 months. Learn the 7 keys to better risk assessment. |

Moody’s to Include Cyber Risk in Credit Ratings

Adam Levin

The American business and financial services company Moody’s will start factoring risk of getting hacked into their credit ratings for companies. The move is seen as part of a wider initiative to gauge the risk of cyberattacks and data breaches to companies and their investors. “We’ve We’ve been in the risk management business for a very long time. The post Moody’s to Include Cyber Risk in Credit Ratings appeared first on Adam Levin.

Your Next Move: Cyber Risk Analyst

CompTIA on Cybersecurity

If you’re thriving in a cybersecurity role and want to take your cybersecurity analyst career to the next level, cyber risk analyst may be a good next move

The Cyber Risks of Transportation’s Connected OT/IoT Systems

Security Boulevard

The post The Cyber Risks of Transportation’s Connected OT/IoT Systems appeared first on Nozomi Networks. The post The Cyber Risks of Transportation’s Connected OT/IoT Systems appeared first on Security Boulevard.

What is cyber risk quantification, and why is it important?

Tech Republic Security

One way to get C-level managers and cybersecurity department heads on the same page is to employ cyber risk quantification, as it speaks to costs versus risks

Why Your Cyber Risk Quantification Methodology is Limiting Your Board’s Understanding of Cyber

Security Boulevard

Cybersecurity and risk management are essential to the success of an enterprise, but not all business units see it like that. Because leaders don’t understand the value of cyber risk, they are going to be less incentivized to invest and improve their cybersecurity posture.

Digital Transformation Frameworks for Cyber Risk Teams

Security Boulevard

The post Digital Transformation Frameworks for Cyber Risk Teams appeared first on Security Boulevard. Businesses are embracing digital transformation to drive agility and ensure their success in a digital-first economy.

Top 5 Cyber Risk Questions Board Members Ask Axio

Security Boulevard

Executive Summary Board Members Request Business-Centric Cyber Risk Reporting Recently, our board member customers have expressed great interest in understanding cyber risk in business terms. Security Bloggers Network cyber-risk

6 steps for third-party cyber risk management

CSO Magazine

Many organizations transact with hundreds of third-party partners, according to EY’s Global Third-Party Risk Management Survey 2019-2020 , a trend that PwC finds shows no sign of slowing, even as the risks increase.

How Digital Transformation Impacts IT And Cyber Risk Programs

Security Boulevard

The post How Digital Transformation Impacts IT And Cyber Risk Programs appeared first on Security Boulevard. The rise of smart devices and changing customer preferences have kicked global digital transformation into full gear.

Reducing cyber risk is not impossible: your friend PAUL can help

StaySafeOnline

The post Reducing cyber risk is not impossible: your friend PAUL can help appeared first on Stay Safe Online

Watch Out for These Cyber-Risks

Dark Reading

It's difficult to predict what will materialize in the months ahead in terms of cyber-risks, which is why it's wise to review your organization's security posture now

5 Reasons You Can’t Miss This Discussion on Cyber Risk with former BP CEO Bob Dudley

Security Boulevard

As a security leader, if your Board or CEO struggle to understand the state of your organization’s cyber risk posture, you will effectively be. Read article > The post 5 Reasons You Can’t Miss This Discussion on Cyber Risk with former BP CEO Bob Dudley appeared first on Axio.

Accellion data breach highlights third party cyber risk

Security Boulevard

Two mega-breaches caused by third parties have occurred over the last month, adding to the recent Solarwinds epic supply chain hack, to create a growing tsunami of third party risk for enterprises and government organizations.

3 ways to speak the board's language around cyber risk

CSO Magazine

The days of a hopeless disconnect between security leaders and the board of directors have come to a close—at least for enterprises with a healthy risk posture.

Time is Not on Your Side: Why Every CISO needs a Cyber Risk Quantification Strategy before It’s Too Late

Security Boulevard

Cyber Risk Quantification needs to be the strategy driving your cybersecurity roadmap and priorities starting now. Read article > The post Time is Not on Your Side: Why Every CISO needs a Cyber Risk Quantification Strategy before It’s Too Late appeared first on Axio.

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production.

The First Half of 2021 Cyber Risk Index

Trend Micro

Learn about the current state of cyber risk organizations are facing today based on the Cyber Risk Index results for the first half of 2021.

Ask the Expert: Why is it critical that organization mature their cyber risk program now?

Security Boulevard

Kirk Hogan, Iceberg Networks and Bill Vollono, Recorded Future sat down to discuss how the pandemic is having an effect on cyber risk programs. The post Ask the Expert: Why is it critical that organization mature their cyber risk program now?

Choosing your MSP: What the Kaseya incident tells us about third?party cyber risk

We Live Security

The post Choosing your MSP: What the Kaseya incident tells us about third‑party cyber risk appeared first on WeLiveSecurity. Lessons to learn from the Kaseya cyberincident to protect your business' data when doing business with a MSP.

Third-Party Cyber-Risk by the Numbers

Dark Reading

Recent stats show that the state of third-party cyber-risk and vendor risk management remains largely immature at most organizations

Why it's important to create a common language of cyber risk

Tech Republic Security

All departments of an organization need to be on the same page where cybersecurity is concerned, and that will only happen if the terminology used is understood by all

Why Cyber-Risk Is a C-Suite Issue

Dark Reading

Organizations realize the scale of cyber-risk but lack counter-actions to build resilience

Despite Heightened Cyber-Risks, Few Security Leaders Report to CEO

Dark Reading

A new report suggests that top management at most companies still don't get security

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

Security Boulevard

The post GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news appeared first on Security Boulevard. Industry 4.0 has brought about a metamorphosis in the world of business.

Close the Gap Between Cyber-Risk and Business Risk

Dark Reading

Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk

Ransomware: A Deep Dive into 2021 Emerging Cyber-Risks

Threatpost

Our new eBook goes beyond the status quo to take a look at the evolution of ransomware and what to prepare for next. Cloud Security Critical Infrastructure eBook Government IoT Malware Web Security

Cyber-Risks Hiding Inside Mobile App Stores

Dark Reading

As the number of blacklisted apps on Google Play continues to drop, attackers find new ways to compromise smartphones

Quantifying Cyber Risk: Why You Must & Where to Start

Dark Reading

Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them

The Case for Cyber-Risk Prospectuses

Threatpost

Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

The Last Watchdog

As jarring as this abrupt shift to remote work has been for countless companies, government agencies and educational institutions, it has conversely been a huge boon for cyber criminals. Thus the urgency for organizations to put all excuses aside and embrace stricter cyber hygiene practices could not be any higher. All year now they’ve been stepping up cyber attacks that leverage and/or exploit the notoriety of the global pandemic in one way or another.

Cyber-Risks Explode With Move to Telehealth Services

Dark Reading

The hasty shift to online delivery of primary care services since the COVID-19 outbreak has attracted significant attacker interest

Free Mobile App Measures Your Personal Cyber Risk

Dark Reading

New app for Android and Apple iOS uses an algorithm co-developed with MIT to gauge security posture on an ongoing basis

Manufacturing’s Cloud Migration Opens Door to Major Cyber-Risk

Threatpost

New research shows that while all sectors are at risk, 70 percent of manufacturing apps have vulnerabilities. Cloud Security Critical Infrastructure Mobile Security Vulnerabilities Web Security

How Smart Organizations Mitigate Cyber Risks in a World of Unknown Unknowns

CyberSecurity Insiders

By Shay Siksik, VP Customer Operations and CISO, XM Cyber. We call these things “unknown unknowns” — and they are the most challenging to deal with from the perspective of risk management and cybersecurity. Managing Risk in a World of Unknown Unknowns.

Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber Risk

The Security Ledger

In this interview, Camille Stewart, Google’s Head of Security Policy for Google Play and Android explains how understanding how systemic racism influences cyber security is integral to protecting the American people and defending the country from cyber adversaries.

Update: DHS Looking Into Cyber Risk from TCL Smart TVs

The Security Ledger

Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The acting head of the U.S.

DHS Looking Into Cyber Risk from TCL Smart TVs

The Security Ledger

Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The acting head of the U.S.

Mitigating Cyber-Risk While We're (Still) Working from Home

Dark Reading

One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers

Hardening the Physical Security Supply Chain to Mitigate the Cyber-Risk

Dark Reading

Nick Smith, Regional Manager at Genetec, details how physical security professionals can improve their resilience to cyberattacks by reviewing the cybersecurity policies of those they work with in the supply chain. This includes everyone from component vendors to installers and engineers

Working at a safe distance, safely: Remote work at industrial sites brings extra cyber risk

Tech Republic Security

When workers need to get things done in a dangerous locale, sometimes they have to be distant. This opens up plenty of cybersecurity hazards. We spoke with one expert about how to achieve that security