article thumbnail

GUEST ESSAY: Why internal IT teams are ill-equipped to adequately address cyber risks

The Last Watchdog

The SEC’s incoming rules on handling cybersecurity are sweeping to say the least, ranging from 24/7 real-time monitoring to new documentation requirements to new security and vulnerability scanning and remediation requirements. This comes after the second highest year of enforcement actions from the Securities and Exchanges Commission (SEC).

article thumbnail

The ultimate guide to Cyber risk management

CyberSecurity Insiders

Ambitious information security experts serve as a critical part of cyber risk management. This can be achieved through the use of cyber risk management approaches. This article explores the need for security and provides an overview of cyber risk assessment. Cyber risk management. Risk control.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Unisys, for instance, was found to have framed cyber risks hypothetically even though its systems had already been breached, exfiltrating gigabytes of data. SEC investigators gathered evidence that Unisys Corp., Bottom line, until government regulators stop blaming companies, they need to be very cautious in disclosures.

CISO 263
article thumbnail

The March Madness Cyber Threat

Adam Levin

Educating employees and colleagues about the risks of phishing emails, cloned websites, and other common vectors for cyberattacks, especially during annual events like March Madness or the Superbowl can help prevent a data incident. Use online or cloud-based office software for non-sensitive documents.

article thumbnail

7 Insights About Managing Cyber Risk You Can’t Afford To Miss

Jane Frankland

It puts you in a better position to ascertain which strategies you’ll use to accept, avoid, transfer and limit risk. Numerous studies have documented how men and women gauge risk differently. Whilst managing cyber risk does require you to use risk management standards and frameworks, it’s not a case of using one over another.

article thumbnail

MIT Research Documents Effectiveness of Consensus Cyber Risk Oversight Principles

Dark Reading

Organizations that use the consensus principles can significantly improve their cyber resilience without raising costs, MIT research shows.