CYBER THIS WEEK – OCT 8, 2023
A Tool to Help Boards Measure Cyber Resilience
The value of discussing a balanced view of cybersecurity risks at the board level does not come from comparing today’s posture with yesterday’s posture, but from making sure that, the business is prepared today and tomorrow for potential disruption from a cyber incident.
A Tool to Help Boards Measure Cyber Resilience (hbr.org)
How is cyber innovation disrupting the energy sector and critical infrastructure?
The energy sector operates critical infrastructure. Access to affordable, reliable energy remains a critical enabler for economic prosperity everywhere around the world. Because energy infrastructure serves as the backbone for global nations and businesses to operate, it is a frequent target for cyberattacks.
5 Cyber Insurance Trends To Watch Right Now
Driven by the onslaught of ransomware attacks, cyber insurance premiums went through a period of stunning price hikes in 2020 and, especially, in 2021. The pricing surge peaked in late 2021, when cyber insurance pricing was up 133 percent from the year before, according to global figures from Marsh McLennan.
5 Cyber Insurance Trends To Watch Right Now | CRN
How PEAK framework can enhance threat hunting programs
PEAK, which stands for “Prepare, Execute, and Act with Knowledge,” is built on the accumulated experience of threat hunters and gives practitioners a blueprint for conducting focused, high-value hunts that “move the needle” for an organization’s security readiness.
How PEAK framework can enhance threat hunting programs | Security Magazine
Could Cybersecurity Breaches Become Harmless in the Future?
With these five steps, organizations can develop stronger security practices and make the inevitable breaches inconsequential.
Could Cybersecurity Breaches Become Harmless in the Future? (darkreading.com)
Can MSSPs Close the Cybersecurity Skills Gap?
Managed Security Service Providers (MSSPs) perform a critical role for businesses without the resource or competency to handle their cybersecurity inhouse. Some of the key reasons businesses turn to them is to cope with the difficulty in obtaining and retaining skilled personnel, to cover specific IT skills gaps or to help contain the spiraling complexity and costs associated with cybersecurity operations and maintenance.
Can MSSPs Close the Cybersecurity Skills Gap? – CPO Magazine
The value of threat intelligence — and challenges CISOs face in using it effectively
Many CISOs have been using threat intelligence — or more specifically cyber threat intel — for years, recognizing that the additional data about the threat landscape can help them better prepare for and defend against bad actors. However, a significant percentage of CISOs say they’re falling short in their use of threat intelligence
The value of threat intelligence — and challenges CISOs face in using it effectively | CSO Online
Beefing up cybersecurity for India’s energy transition
To create a world-class clean energy ecosystem in India that is safe, all stakeholders must work collectively to develop all critical components and associated cyber architecture
Beefing up cybersecurity for India’s energy transition | ORF (orfonline.org)
How Converged IAM Paves The Way For Digital Transformation
IAM is the glue that holds everything together and protects an organization from unauthorized access, hacks and data breaches. The ability to know who is using the system, continuously authenticate the individual or device and ensure that they have access only to authorized applications, data and resources is also at the foundation of zero-trust security.
How Converged IAM Paves The Way For Digital Transformation (forbes.com)
Damage Control: Addressing Reputational Harm After a Data Breach
Data breaches are expensive. Direct costs, like remediation, notification, lawsuits, fines and potential ransomware payments, are relatively easy to measure. The indirect cost of reputational damage can be harder to capture, but it can have a long-lasting impact on a business.
Damage Control: Addressing Reputational Harm After a Data Breach (informationweek.com)