Remove Cyber Risk Remove Event Remove Technology
article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.

CISO 263
article thumbnail

CyberSecurity Is Not Enough: Businesses Must Insure Against Cyber Losses

Joseph Steinberg

And even relatively rich organizations may fail altogether if they suffer the reputational harm that follows multiple serious cyber-incidents. Not only are they not protected against their own losses, but many have zero liability protection in the event that they somehow become a hacker’s catalyst for inflicting cyber-damage on others.

Insurance 364
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Shifting from Business Continuity to Continuous Business in Cyber

Jane Frankland

Attending their annual global event series, SHIFT , in London recently, he redefined the future of business resilience in his keynote address and positioned the concept of continuous business—a ground-breaking state of perpetual availability and robustness which revolves around four pivotal elements: 1.

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. Related: The case for quantifying cyber risks The most important factor that should be taken into account is a security risk assessment.

article thumbnail

In the News | Cyber Risks for Higher Ed and Strategies To Mitigate Them

Security Boulevard

Education is particularly susceptible to cyber security events when compared to other industries Professors are on the front lines of detecting cybersecurity risks. The post In the News | Cyber Risks for Higher Ed and Strategies To Mitigate Them appeared first on Security Boulevard.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

Ambiguity about cyber security threats, legal responsibilities, and unexpected events is exacerbated for IT security professionals who don’t understand where resources are positioned, how well they are handled, or whether they are susceptible. . . ITAM simplifies asset protection without sacrificing simplicity.

article thumbnail

Where Does ChatGPT Fall on Your Cyber Risk Register?

SecureWorld News

So it's fitting that a recent SecureWorld webcast, sponsored by Spirion, tackles the topic of "Does ChatGPT Belong on Your Cyber Risk Register? CEO of Global Cyber Risk LLC, offers this advice: "You need to have a process for evaluating the risks associated with that technology, in this case Chat GPT.