Remove Cyber Risk Remove Digital transformation Remove Information Remove Technology
article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Such a transformation however, comes with its own set of risks. Misleading information has emerged as one of the leading cyber risks in our society, affecting political leaders, nations, and people’s lives, with the COVID-19 pandemic having only made it worse.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. We need to pick-up some by-products from our cutting-edge technologies, and it should be aligned with our future technologies.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk

The Security Ledger

In this Spotlight* podcast, Sayed Wajahat Ali the Senior Director of Security Risk Management at DU TELECOM in the UAE joins us to talk about how digital transformation is shaking up the once-staid telecommunications industry and how his company is staying on top of both the risks and opportunities created by digital transformation.

article thumbnail

Webinar Recap: Mitigating Cyber Risks

SecureWorld News

What is the difference between a day at the beach and managing a cyber risk assessment plan? SecureWorld recently presented the webinar Cyber Risk: Stay Ahead of Evolving Threats With Proactive Collaboration with speakers representing Reciprocity, a leader in Governance, Risk, and Compliance Software (GRC).

article thumbnail

Lunch and Learn: How to Introduce Cyber Risk Quantification (CRQ) to Your Organization

Security Boulevard

A successful quantitative cyber risk management program begins with lunch – more specifically, a Lunch ‘n’ Learn or other roadshow event to introduce to stakeholders the concepts, benefits, and practical details of launching a CRQ program or capability. What Is Cyber Risk Quantification?

article thumbnail

Spotlight Podcast: RSA President Rohit Ghai warns Digital Transformation is magnifying Enterprise Risk

The Security Ledger

In this interview, recorded at the RSA* Charge conference, RSA President Rohit Ghai talks about some of the ways that digital organizations have to adapt to- and address risks introduced by new transformative technologies like machine learning, multi cloud environments and robotics and other "digital transformation" initiatives.

article thumbnail

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

The Last Watchdog

So they began inundating their third-party suppliers with “bespoke assessments” – customized cyber risk audits that were time consuming and redundant. Kneip also painted the wider context about why effective third-party cyber risk management is an essential ingredient to baking-in security at a foundational level.