This Insight Risk Management Suite (V.5) bridges the gap between strategic risk management and IT operations by intelligently assessing governance, security and compliance information, then aligning them with business-orientated priorities for more predictable business outcomes
Governments and corporations are facing considerable risk to their data, their underlying networks and the reliability of their products because of a confluence of three factors.
From Facebook to The Washington Post to Target – 2013 showed us that no matter what, personal data is at risk, more so than ever before.
February 1, 2014
As the number of cyber attacks increase, the cost, frequency and time to resolve them increases as well. Conducted by the Ponemon Institute and sponsored by HP Enterprise Security Products, the 2013 Cost of Cyber Crime Study found that the average annualized cost of cybercrime incurred by a benchmark sample of U.S. organizations was $11.56 million, representing a 78-percent increase since the initial study was conducted four years ago.
IT security risks continue to become more challenging, not just because of the new technologies of systems and applications, but also because of the size and stature of criminal organizations involved in malicious cyber activity.
To best protect your company against internal abuse, it is helpful to understand the nature of the threat and to consider applying risk-based approaches to address the problem.
Let’s start with the good news. Malicious insider activity is relatively rare. Unfortunately, even though outsiders account for 85 percent of cybersecurity incidents, the damage often is substantially greater when an insider strikes.
I used to write stories like this on a typewriter back in the day. My articles turned out to be a mass of White-Outs to counter typing mistakes. It all made me dizzy. Today’s computer technology even auto-corrects my words, which sometimes is not a good thing.
Risk managers might be overlooking a critical threat: the impact of technology failures on supply chain general operations, according to a new report from Marsh risk Management Research, Cyber Risks Extend Beyond Data and Privacy Exposures.
Struggling to keep up with today’s cyber security challenges? Read more on how CISOs or CSOs can develop a modern plan for cyber security.
September 1, 2013
Are you (and your enterprise) struggling to keep up with the pace of today’s cyber security challenges? You aren’t alone, but you aren’t without resources.