Remove Cyber Risk Remove Event Remove Information Security Remove Technology
article thumbnail

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

The Last Watchdog

Related: Poll shows seniors execs get cybersecurity A hazard is anything that can interfere with a company meeting its objectives; it could be something physical, such as a fire, a theft or a natural disaster; or it could be an abstract risk, such as a lawsuit or a regulatory fine. Consumers chose to value convenience over security.

article thumbnail

How Diversity and Inclusion Initiatives Can Reduce Cyber Risk

Centraleyes

In the aftermath of the national reckoning on racial justice ignited by the tragic events involving George Floyd, it became evident that despite good intentions, the cybersecurity sector had not tackled the field’s predominantly white and male composition. User-Centric Design Poor user decisions often exacerbate cyber risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

Ambiguity about cyber security threats, legal responsibilities, and unexpected events is exacerbated for IT security professionals who don’t understand where resources are positioned, how well they are handled, or whether they are susceptible. . . ITAM simplifies asset protection without sacrificing simplicity.

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. Related: Good to know about IoT Physical security is often a second thought when it comes to information security.

article thumbnail

Six strategic cyber investments for the next six months – and beyond

CyberSecurity Insiders

We are also now seeing the proliferation of weaponized cyberattacks in the face of geopolitical events. This new era of attacks demonstrate that the cyber landscape will never be the same. Single Sign-on (SSO) – The core technology that allows disparate systems all to identify users from a single set of credentials.

article thumbnail

How Do You Quantify Risk? Best Techniques

Centraleyes

Enter the need for a more precise and actionable approach — Cyber Risk Quantification. This blog aims to serve as a guide to navigating the intricate terrain of cyber risk quantification, providing insights into its significance, methodologies, and the transformative impact it can have on organizational cybersecurity strategies.

Risk 52
article thumbnail

Fitch Ratings: Cyberattacks could pose a material risk to water and sewer utilities

Security Affairs

Fitch Ratings published an alert last week to warn of the “material risk” to water and sewer utilities caused by cyber attacks that could also impact their ability to repay debt. ” Credit rating agencies assess the capacity for utilities to repay their debt and cyber attacks could impact it. ” concludes the alert.

Risk 113