CYBER THIS WEEK – JUNE 11 , 2023

Assessing the Correlation between Cyber Risk and Business Risk

Now more than ever, cyber risk is a fundamental business risk for the modern enterprise, and it’s imperative to design security architectures accordingly. By establishing cyber resilience as a foundational tenet of their wider business ecosystem, organizations can make measurable strides toward a safer and more secure future.

Assessing The Correlation between Cyber Risk and Business Risk (forbes.com)

As Cyberthreats Grow, Can Zero Trust Protect Healthcare Organizations’ Data?

Healthcare organizations and their IT teams must understand that it is a process, not a destination. The steps an organization takes toward zero trust will evolve as numerous factors change, including the organization’s business needs, the threats it faces and the security solutions it uses.

As Cyberthreats Grow, Can Zero Trust Protect Healthcare Organizations’ Data? | HealthTech Magazine

10 security tool categories needed to shore up software supply chain security

Software supply chain security is advancing rapidly and if CISOs are only focusing on SCA and SBOM they could only be getting a partial solution to the problem. CSO offers a starter checklist for planning out the software supply chain security solution stack.

10 security tool categories needed to shore up software supply chain security | CSO Online

Here’s what your organization needs to know about cyber insurance

Insurers provide cybersecurity recommendations and the insured look to insurers to understand the insurance needs. As such, it is critical to close the gap in both the insurers’ technical cybersecurity knowledge and their knowledge of how the insured’s organization is structured digitally to understand what is already deployed and what else is needed to increase security.

What your organization needs to know about cyber insurance | World Economic Forum (weforum.org)

How Converging IT and OT Has Enhanced Security

With the convergence of OT and IT teams, IT teams can look out for cyber security protocols, and OT teams can ensure physical measures are in place, setting up manufacturers for smooth sailing, knowing that they are operating securely. As a result, manufacturers will not only benefit from enhanced security, but also reap benefits like improved ROI, performance, productivity and agility.

How Converging IT and OT Has Enhanced Security | Manufacturing.net

5 Ways to Implement AI During Information Risk Assessments

AI is allowing companies to mitigate potential security risks and even predict future attacks with greater speed and accuracy than they could ever achieve through manual processes. And there are a number of use cases for AI in risk assessment that show how companies can do this.

5 Ways to Implement AI During Information Risk Assessments – CPO Magazine

DNV Maritime Cyber Priority 2023: Shipping faces 5 major cyber security challenges

DNV has released the 2023 edition of Marine Cyber Priority report which examines the maritime industry’s cyber risk challenges as well as measures for resilience.

DNV Maritime Cyber Priority 2023: Shipping faces 5 major cyber security challenges – SAFETY4SEA

Maritime Cyber Priority 2023: Staying secure in an era of connectivity – DNV

The Cyber Resilience Imperative for Software Supply Chain Security

Cyber resilience is vitally important for several reasons. It not only improves an organization’s security posture and reduces exposing critical infrastructure but can help instill client and customer trust. If you don’t have a solid cyber resilience strategy, you risk the ability to maintain business continuity after a cyberattack. This can have a major financial impact as well as cause reputation damage.

The Cyber Resilience Imperative for Software Supply Chain Security – Rezilion

Cyber Essentialism & ‘Doing Less With Less’

Cybersecurity benefits from a focus on the vital few chores rather than the trivial many. Find the “right things” to encourage strategic thinking, then move the culture needle to promote that policy.

Cyber Essentialism & ‘Doing Less With Less’ (darkreading.com)

MOVEit Transfer Zero-Day Vulnerability: What Companies Need to Know

File transfer services play crucial roles in securing business and government operations, but companies must be aware of the inherent risks and adopt mitigations to safeguard against those risks. Cybersecurity risks rise exponentially when an application or a service that an organization relies on develops a previously unknown security vulnerability. The recently discovered zero-day in MOVEit Transfer provides such a vulnerability for threat actors to exploit.

MOVEit Transfer Zero-Day Vulnerability: What Companies Need to Know | Baker Donelson – JDSupra

Share: