Posted February 5, 2019 by Jeff B. CopelandDigital Transformation: "The blurring of the physical and virtual worlds...transforming business designs, industries, markets and organizations,” Gartner says. “Technology will be embedded in everything in the digital business of the future.”
Posted January 29, 2019 by Jeff B. CopelandIf you’re a CISO who sees your role as “keep the business secure” – you’re only partly right, RiskLens CEO Nick Sanna argues in an article just published by Security Week.
Posted January 28, 2019 by Jeff B. CopelandIt’s been nearly a year since the Securities and Exchange Commission (SEC) issued its “Guidance on Public Company Cybersecurity Disclosures” that shook up cyber risk reporting for US public companies.
Posted January 23, 2019 by Jeff B. CopelandFinally, a fresh perspective on the shortage in cybersecurity personnel that’s not about a) handwringing, b) more investment in university programs or c) more investment in AI or other advanced technologies.
Posted January 22, 2019 by Jeff B. CopelandTwo authoritative surveys of senior corporate leaders on the outlook for 2019 put cyber risk at the top of their list of worries, right up there with recession and climate disasters.
Posted January 18, 2019 by Taylor MazeSometimes, the hardest part of risk management is identifying the areas of weakness within your environment. I would argue, however, that more often than not, the more difficult undertaking is deciding how to address said weaknesses.
Posted January 17, 2019 by Brock KrawczunWe recently conducted an engagement with a bank analyzing the risk associated with wire fraud. The outcome surprised some of the team who went through the process. One of the biggest overall findings was that the loss exposure was significantly less than expected
Posted January 15, 2019 by Jeff B. CopelandIn a new article for the Wall Street Journal's WSJ Pro Cybersecurity newsletter, Kim S. Nash writes that “Corporate security leaders often fight a perception among other senior leaders that cybersecurity efforts bring costs without quantifiable returns.
Posted January 11, 2019 by Jeff B. CopelandThe Advanced Cyber Security Center is just out with a study on Leveraging Board Governance for Cybersecurity that makes a strong case, and lays out some specific recommendations, for boards to demand cyber risk analytics—not operational checklists—as a basis for board oversight on cybersecurity.
Posted January 9, 2019 by Jeff B. CopelandIan Amit faces a complex management problem as Chief Security Officer at Cimpress, the parent company for multiple independent businesses: Each unit chooses and operates its own technical stack and security and risk management in a “shared security responsibility” model. How to lead from behind?