Most security and risk professionals can’t reliably establish a big-picture view of their cyber risk environment. Fragmented cyber risk data, siloed data streams, technical jargon and inconsistent ...
Risk aggregation is not a new phenomenon. The insurance industry, for example, has long examined how shared assets and similarities between organizations in their books bundle potential risk. Risk ...
Bridging the gap between cyber security and enterprise risk management programmes is a key priority for risk professionals, according to Jayant Dave, Check Point’s chief information security officer ...
The more you spend, the more secure you feel. That’s the trap. Chief information security officers (CISOs) spend most of their time in meetings discussing what cyber tools will ensure security, from ...
Editor’s Note: This is the first in a series on Cybersecurity in Supply Chains by SK Jeong, a University of Tennessee professor and digital supply chain researcher experienced in detecting ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results