Scaling Cyber Supply Chain Risk Management with Dark Web Monitoring

Posted by - October 2, 2018
Implementing Protections Against Cyberattacks Many recent cyberattacks have come through exposures in third-party systems. There is an evident need to monitor the cybersecurity of third parties, and this puts the spotlight on cyber supply chain risk management (C-SCRM). Experts from Kroll outline what companies can do to protect their systems…

Preparing for Cyber Risk

Posted by - September 13, 2018
Q&A with Steve Durbin, Managing Director of ISF Maurice discusses with Information Security Forum’s Managing Director, Steve Durbin, some of the key challenges businesses face today in terms of cybersecurity, as well as how ISF helps its clients manage those risks. Maurice Gilbert: What are the most significant risks that…
cybersecurity concept padlocks on binary code

8 Realities in Managing Cyber Risk

Posted by - August 29, 2018
Thoughts on Increasing Cyber Resiliency Companies’ adoption of new technologies is outpacing their ability to protect against evolving cybersecurity threats. It used to be said that it’s not a question of IF an organization will be breached, but WHEN. Jim DeLoach suggests that companies either know they’ve been breached or…
security button on laptop with padlock

Why Companies Misunderstand Third-Party Cyber Risk

Posted by - August 23, 2018
Rethinking How We Discuss Vulnerabilities in the Digital Supply Chain The fundamental principle that makes the internet so powerful is the concept of connecting previously disparate systems, and yet many firms are struggling to understand the digital – and in particular, the cybersecurity – implications of their business relationships. Why…
illustration of man in suit pulling thread from tangled mess

Needed: A New Approach to Risk Modeling in an Asymmetric World

Posted by - August 20, 2018
A Forward-Looking Response to a Chaotic World The actuarial model of risk compliance employed by most large global enterprises – calculating the odds of future events based on past occurrences – has become outdated and ineffective, as the internet and global interdependencies have created an asymmetric, chaotic world in which…
graph showing increasing added value

4 C’s to Increase the Value of Internal Audit

Posted by - July 20, 2018
Ensuring the Effectiveness of a Risk-Based Audit Plan Protiviti’s Jim DeLoach explores how to bolster internal audit’s efforts in providing recommendations that are strong, actionable and in keeping with the board’s expectations. We’ve always believed that boards should ensure that their organizations maximize the full potential of internal audit. There…
blur of audience in crowded auditorium

“Gone are the Days of Rigid Lines of Defense”

Posted by - July 17, 2018
Key Insights and Trends from the MetricStream GRC Summit 2018 MetricStream’s 2018 Summit in Baltimore saw several hundred business executives, government leaders, GRC practitioners and industry analysts gather to talk GDPR, strategies and solutions for building better governed, more compliant organizations and more. Gaurav Kapoor, MetricStream’s Chief Operating Officer, shines…
digital padlock above tablet

7 Cybersecurity Predictions for 2018

Posted by - February 8, 2018
The Inherent Risk (and Reward) of Innovation This year, cybersecurity officers must rethink their end-to-end security ecosystem. Top priority will be identifying and addressing evolving vulnerabilities to people, processes, technologies and service providers. It’s time both to re-evaluate the overarching security strategy and to take a more security-minded approach from…
magnifying glass on paper

Bringing NYDFS Compliance into Focus

Posted by - November 1, 2017
The New York Dept. of Financial Services (DFS) Cybersecurity Requirements force companies to look into ways to prepare and tactics to navigate new regulations. This risk-driven regulation which requires financial services institutions, regulated by (DFS) to establish and maintain a cybersecurity program that will protect both customers’ private data and…
the white house in washington d.c.

Cybersecurity Expertise: From the White House to the C-Suite

Posted by - October 27, 2017
FTI Journal Profiles Anthony Ferrante In this Q&A from the FTI Journal, Anthony Ferrante addresses the growing cybersecurity threats affecting U.S. businesses today. Anthony has personally witnessed the rapid evolution of cyber risk and discusses his intelligence-led, strategic approach for addressing the cybersecurity threat to corporate America. This piece was…
AI brain on blue background

Intelligent Automation: Designing the Intelligent Organization

Posted by - September 25, 2017
The Driver Behind Enterprise Situational Awareness Intelligent automation is an emerging solution to enable intelligent decision-making at the strategic level, but it doesn’t necessarily have to be complex or require cumbersome new infrastructure. In fact, since overly complicated approaches to intelligent automation tend to result in project failure, simplicity may…