Remove CSO Remove Cyber Risk Remove Risk
article thumbnail

Security teams report rise in cyber risk

CSO Magazine

If you are like 80% of respondents to the Trend Micro’s biannual Cyber Risk Index (CRI) report, you expect to experience a data breach that compromises customer data in the next 12 months. Learn the 7 keys to better risk assessment. | Get the latest from CSO by signing up for our newsletters. ].

article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Unisys, for instance, was found to have framed cyber risks hypothetically even though its systems had already been breached, exfiltrating gigabytes of data. But the SEC’s latest actions underscore that failing to inform stakeholders about material risks and breaches is not an option.

CISO 263
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exposure Management Works When the CIO and CSO Are in Sync

Security Boulevard

In this post, Tenable CIO Patricia Grant looks at how the CIO/CSO relationship is key to a successful exposure management program. When I first joined Tenable, one of the first things I did was sit down with our CSO, Robert Huber , to align on how we were going to work together. And we both bring something essential to the table.

CSO 52
article thumbnail

3 ways to speak the board's language around cyber risk

CSO Magazine

The days of a hopeless disconnect between security leaders and the board of directors have come to a close—at least for enterprises with a healthy risk posture.

article thumbnail

BrandPost: An Intelligent Way to Monitor and Manage Your Cyber Risks

CSO Magazine

Cyber risks, especially those emanating from third and fourth parties, are escalating. Yet gaining a clear picture of these risks is much more complex given interwoven ecosystem dependencies, data sitting in silos, and many organizations’ lack of a security mindset.

article thumbnail

Cybersecurity’s Comfort Zone Problem: Are you Guilty of it?

Jane Frankland

Instead of focusing on accessible, impactful solutions like human risk management, we gravitate toward shiny new technologiestools and systems that feel exciting, measurable, and comfortably within our domain of expertise. The hard truth is that technology alone cant fix the root causes of cyber risk.

Risk 100
article thumbnail

6 steps for third-party cyber risk management

CSO Magazine

Many organizations transact with hundreds of third-party partners, according to EY’s Global Third-Party Risk Management Survey 2019-2020 , a trend that PwC finds shows no sign of slowing, even as the risks increase.