Posted May 19, 2017 by Cody Whelan
For a few weeks now in blog posts, I’ve referenced the Top 10 cybersecurity risk analysis I conducted with RiskLens for a financial institution customer (see In a Top 10 Risks Analysis, Get These Two Factors Right). Now that anticipation is at a peak, I figured I would provide my overview, along with some key insights to each risk-analysis scenario.
Posted May 2, 2017 by Cody Whelan
I just wrapped an engagement analyzing a bank’s top 10 risks with RiskLens, and the results were surprising: One of the risks the bank’s infosecurity team most feared turned out to be not much of a concern while another risk that was flying under their radar in fact had the potential to do them serious harm.
Posted March 17, 2017 by Cody Whelan
The CISO knew he had a data leak but he didn’t know how big. He suspected data masking was the solution but he couldn’t make a business case for the investment. Those were the problems RiskLens Risk Consultant Cody Whelan and team set out to solve for this client. (No company names here; we respect our clients’ privacy.)
Read Cody’s notes to pick up the story:
Posted February 27, 2017 by Cody Whelan
Trench warfare on the risk analysis front
I am ashamed to admit it, but it’s happened to me before.
Posted February 16, 2017 by Cody Whelan
In my last post, I discussed the importance of scoping in risk analysis.
Posted January 27, 2017 by Cody Whelan
There is nothing finer than a well-constructed and thought-out risk scenario, bar none.
Posted January 10, 2017 by Cody Whelan
From GRC to IRM
A shift, or something of a rebranding within the GRC space has been gathering steam over the past few months.
Posted November 11, 2016 by Cody Whelan
As part of our series on the newly proposed cyber risk management regulations for US banks, I wanted to piggyback off of the great insights my colleague Isaiah McGowan recently shared in a post, as well as bring to the forefront a concerning premonition that is based on past experience.
Posted October 11, 2016 by Cody Whelan
What’s the same about a lost company cell phone, a web application attack and a database breach?
Posted October 3, 2016 by Cody Whelan
The vendor assessment teams we’ve had the opportunity to work with are great.