To compete and win in today’s technology-driven world, companies need to get cybersecurity right. And boards must provide the oversight to ensure that they get there.
Bestselling author Michael Levin interviews David X Martin on how large enterprises can protect themselves from cyber attacks and develop cyber wellness.
Strategic plans define the need for an action, the impact of that particular action and driving forces behind the action. Security strategy in any organization starts with an in-depth analysis of their business.
A security risk assessment can be performed on any application, function, or process within your organization. The results give you a practical (and cost-effective) plan to protect assets and still maintain a balance of productivity and operational effectiveness.
The first of three steps is to designate a senior partner who’s the responsible officer for firm-wide cybersecurity. In the day-to-day management of technology or in a crisis, it is far better to have a skillful leader rather than a subject matter expert. In choosing the right person, his or her leadership skills — communication and crisis management — are equally important.
If you switch from reacting to attacks to preventing them through a cyber wellness program, you’ll be prepared. Here are four steps you need to take if a database gets hacked.
The military strategy called “Defense in Depth” can be applied to cybersecurity. It has defenders deployed in a series of pre-planned positions from which they can advantageously attack the advancing enemy.
Digital communication adds additional functionality and control – but also creates new vulnerabilities. It’s impossible to centrally control every connection with employees and clients – therefore a new approach is required.
There’s growing concern within intelligence communities that hostile governments could cyber-invade financial institutions, not to steal money — but to pollute, destroy and manipulate data. One of the biggest exposures lies in the cloud.
BitSight: You were Chief Risk Officer (CRO) at several major financial institutions. What is the role of the CRO with respect to understanding and overseeing newer, disruptive risks such as cyber?