Key questions for evaluating the profession’s practices in the crisis Risk is the absence of information. There is risk in absolutely…
The pandemic is all over the news and on everybody’s mind. This is especially true of risk managers. It is…
Here’s how to think of the Clean Network: It’s the American internet, minus Chinese technology. Simply put, there would be…
Even the question, “Should you wear a mask?” is a question of risk appetite, trade-offs and strategy This first appeared…
The three essentials for managing people virtually, especially during a crisis involve communication, trust and clear rules of the road.
Start by better understanding drivers of change and taking these four steps to consider risk.
To compete and win in today’s technology-driven world, companies need to get cybersecurity right. And boards must provide the oversight to ensure that they get there.
Botnets are networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets.
Information Security Management (ISM) deals with the implementation and monitoring of a predefined security level for the IT environment. It includes confidentiality, integrity and availability.
Most companies’ cybersecurity strategy is reactive – triage to contain damage. The new way forward is to ensure cyber wellness, which is a proactive stance to prevent and respond to attacks.