While risk assessment is a regular topic of conversation today, when it comes to practicing good risk estimations and decisions in our daily lives, humans have some serious shortcomings.
Businesses need to adopt a strategic approach to managing third-party risks that provides an integrated view of the vendor relationship process.
IT and security professionals must be able to talk business to the C-suite and the board of directors, especially if new security products need to be added into the organization's portfolio.
Many IT professionals and executives alike are not addressing IoT security at the same level at which it's creating tangible business risks.
Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event
IBM Security General Manager Mary O'Brien sat down for a fireside chat with Kevin Baker, CISO of Westfield Insurance, and Maersk CISO Andy Powell about how digital transformation impacts security.
System hardening is more than just creating configuration standards; it involves identifying and tracking assets, drafting a configuration management methodology, and maintaining system parameters.
What can health care companies do to mitigate the risks inherent in the future of health care cybersecurity?
While board directors have been concerned with cybersecurity for some time, we're now seeing reports that they are improving their understanding of cyber risks and how those risks can impact business.
The enactment of recent privacy mandates is just the start. A comprehensive data risk management program established before more regulations go into effect is well worth its weight in gold.
In the security industry there is a range of cyber risks that can cause catastrophic damage to a business. What can we learn from other industries that manage these kinds of risks?