CYBER THIS WEEK – DEC 31, 2023
Getting the Board on Board: Explaining Cybersecurity ROI
Despite increasing data breaches, ransomware attacks, and assorted cyber threats, convincing the Board of Directors to invest in robust cybersecurity isn’t always easy for many businesses. The challenge originates mainly from the need to demonstrate a quantifiable Return On Investment (ROI) from any cybersecurity initiative. Many Boards concentrate on performance indicators, profits, and strategic resource distribution, while cybersecurity primarily focuses on risk mitigation. It is crucial to bridge this communication gap to ensure that the Board understands and acknowledges the significance and value of cybersecurity.
Getting the Board on Board: Explaining Cybersecurity ROI | Tripwire
Why CISOs Need to Make Cyber Insurers Their Partners
Treat your cyber-insurance carrier as a partner. Developing a strong relationship and engaging in regular dialogue will improve the renewal and claims process. Remember, nobody has more data on cybersecurity risk and losses than a cyber-insurance carrier.
Why CISOs Need to Make Cyber Insurers Their Partners (darkreading.com)
Are you tracking your cybersecurity implementation?
What good are security recommendations if there’s no way to track implementation? Maybe other industries could give cybersecurity some advice. How do other sectors address similar situations?
Are you tracking your cybersecurity implementation? (securityintelligence.com)
The power of automation for better vendor risk management
By replacing manual processes with automation and shifting from periodic to continuous third-party compliance checks, organizations will reduce human error, save time and resources, and have greater visibility and control over potential risks across their entire vendor ecosystem.
The power of automation for better vendor risk management | Security Magazine
Modernizing Vulnerability Management: Beyond Scanning to Continuous Exposure
As the cybersecurity landscape evolves and vulnerabilities continue to proliferate, organizations must evolve their strategies beyond routine vulnerability scans. Embracing continuous exposure management allows businesses to proactively manage their cybersecurity posture
Modernizing Vulnerability Management: Beyond Scanning to Continuous Exposure – CPO Magazine
In Finance, Escalating Threats Require New Cybersecurity Strategies
The global finance sector is in the eye of a perfect storm. This isn’t only about liquidity challenges, volatile inflation rates, and ever-tightening competition. It’s increasingly about cyber risks.
In Finance, Escalating Threats Require New Cybersecurity Strategies (forbes.com)
5 Ways That AI Is Set To Transform Cybersecurity
Cybersecurity is one of the industries being transformed by AI, though the technology represents a unique double-edged sword for the sector: Both attackers and defenders are using AI’s capabilities to augment their tactics. AI represents a huge turning point for cybersecurity, and it’s important that everyone in the industry understands why and how.
5 Ways that AI Is Set To Transform Cybersecurity (informationweek.com)
Understanding the NSA’s latest guidance on managing OSS and SBOMs
Open-source software is ever vulnerable to malicious actors, but software bills of material can help mitigate the threat. NSA guidance sets a solid foundation for managing the ecosystem.
Understanding the NSA’s latest guidance on managing OSS and SBOMs | CSO Online
By caring about insider threats, CISOs show they care about their coworkers
Security is a team sport. As CISOs, we have to get the entire organization onboard to adhere to the changes to their systems and processes needed for security.
Decoding zero trust in endpoint security: A practical guide for CISOs
The exponential increase in endpoints has vastly expanded the average organization’s attack surface – address this by applying zero-trust best practice to endpoints
Decoding zero trust in endpoint security: A practical guide for CISOs | Computer Weekly