Tag: risk-management
-
The CEO, CFO, and Board’s Role in Cybersecurity – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/the-ceo-cfo-and-boards-role-in-cybersecurity-kovrr/
-
CISOs Transform Into Business-Critical Digital Risk Leaders
Google’s Phil Venables on How AI Creates Structural Advantage in Security. Amid rising cyberthreats, security leaders are using AI tools to drive business enablement and risk management across their organizations, creating unprecedented opportunities for team transformation and career advancement, said Phil Venables, strategic security advisor at Google. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cisos-transform-into-business-critical-digital-risk-leaders-a-28296
-
CISO vs CFO: why are the conversations difficult?
Tags: ai, attack, breach, business, ciso, compliance, cyber, cyberattack, cybersecurity, finance, insurance, jobs, metric, ransomware, RedTeam, risk, risk-management, saas, strategy, technology, threat, toolmight happen, which often means the best outcome is nothing happens. That’s a tough sell.”Although a single cyberattack can wipe out millions of dollars, CFOs and CISOs often approach cybersecurity from fundamentally different perspectives. Bridging this divide requires more than just better communication, it demands, as Argyle put it, a shift in mindset. The disconnect…
-
Mehr Assets mehr Angriffsfläche mehr Risiko
Unternehmen sollten ihre Angriffsflächen genau kennen.Nur wer seine Angriffsflächen kennt, kann diese wirksam verteidigen. Was eine Binsenweisheit scheint, scheint vielen Unternehmen jedoch Probleme zu bereiten. Laut einer Umfrage des Security-Anbieters Trend Micro unter mehr als 2.000 Cybersecurity-Führungskräften mussten knapp drei Viertel (73 Prozent) von ihnen einräumen, schon einmal einen Sicherheitsvorfall erlebt zu haben, weil Assets…
-
Half of red flags in third-party deals never reach compliance teams
Third-party risk management (TPRM) is compromised in many organizations because those holding the relationship with the third-party (relationship owners) don’t escalate red … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/02/third-party-relationship-owners/
-
Capgemini Launches pKYC Sandbox to Modernize Compliance and Streamline Risk Management
First seen on scworld.com Jump to article: www.scworld.com/news/capgemini-launches-pkyc-sandbox-to-modernize-compliance-and-streamline-risk-management
-
Insider Research im Gespräch – Paradigmenwechsel in der IT-Security: Das proaktive und automatische Risikomanagement
Tags: risk-managementFirst seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-am-wendepunkt-loesungen-und-zukunftsaussichten-a-e8d0c60d213e82f6a7707c5bc12a5b72/
-
The 14 most valuable cybersecurity certifications
Tags: access, ai, application-security, attack, automation, best-practice, blockchain, blueteam, china, cisa, cisco, ciso, cloud, compliance, computer, computing, conference, control, country, credentials, cryptography, cyber, cybersecurity, data, defense, encryption, endpoint, exploit, finance, governance, government, guide, hacker, hacking, incident response, intelligence, Internet, jobs, kali, law, linux, malware, metric, microsoft, monitoring, network, penetration-testing, privacy, reverse-engineering, risk, risk-analysis, risk-management, skills, threat, training, vulnerability, windowsIndustry recognition Who’s to say one certification is more respected than another? Such criteria can be very subjective, so we turned to the most direct and unbiased source to cut through the ambiguity: job listings. In addition to education, skills, and qualifications, employers often specify certs they seek in their ideal candidate. These mentions carry…
-
KnowBe4 Appoints Bryan Palma as President and CEO
KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, announced that cybersecurity industry veteran Bryan Palma has been appointed president and chief executive officer of KnowBe4, effective May 5. KnowBe4’s founder and current chief executive officer Stu Sjouwerman has transitioned to the role of executive chairman. Palma is a highly regarded technology executive with…
-
Current SaaS delivery model a risk management nightmare, says CISO
JPMorgan Chase security chief Patrick Opet laments the state of SaaS security in an open letter to the industry and calls on software providers to do more to enhance resilience First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366623300/Current-SaaS-delivery-model-a-risk-management-nightmare-says-CISO
-
CNAPP-Kaufratgeber
Tags: access, ai, application-security, attack, authentication, cloud, container, detection, edr, encryption, framework, group, ibm, infrastructure, intelligence, kubernetes, linux, ml, monitoring, network, open-source, risk-management, saas, soar, software, supply-chain, threat, tool, vmware -
Kovrr Launches First-Ever CRQ-Powered Cyber Risk Register
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/kovrr-launches-first-ever-crq-powered-cyber-risk-register/
-
Secure by Design is likely dead at CISA. Will the private sector make good on its pledge?
Tags: cisa, cybersecurity, government, office, risk, risk-management, sbom, software, technology, toolCISA’s Secure by Design effort is ‘tiny’: Not everyone believes in the concept of security by design. Jeff Williams, founder and CTO of Contrast Security and creator of the first OWASP Top 10 list in 2002, told CSO that, in his view, the very first secure-by-design manual was the vaunted August 1983 “Orange Book” produced…
-
From Spreadsheets to SaaS-Based Cyber Risk Registers – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/from-spreadsheets-to-saas-based-cyber-risk-registers-kovrr/
-
Reporting lines: Could separating from IT help CISOs?
Tags: attack, business, cio, ciso, cyber, cybersecurity, exploit, finance, insurance, metric, mitigation, risk, risk-management, skills, technology, vulnerabilityReporting to the CFO can improve discussions about funding: There’s art and science to secure funding. Number matters in getting budget approval, and cybersecurity is at pains to be seen as more than a cost center. However, two-thirds (66%) of CFOs don’t fully understand the CISO role and have difficulty seeing the tangible return on…
-
7 Best Third-Party Risk Management Software in 2025
Whether you operate a small business or run a large enterprise, you rely on third-party suppliers, merchants or software providers. They are fundamental to your operations, but they can pose security risks. The better you understand how that happens, the less likely you are to experience a breach. With the best third-party risk management software,…
-
6 types of risk every organization must manage, and 4 strategies for doing it
Tags: ai, attack, backup, best-practice, breach, business, compliance, control, cyber, cybersecurity, data, finance, framework, fraud, GDPR, governance, government, grc, hacker, healthcare, infrastructure, insurance, intelligence, law, mitigation, office, phishing, ransom, ransomware, regulation, risk, risk-assessment, risk-management, service, startup, strategy, technology, threat, training, vulnerabilityCybersecurity risks Threats such as data breaches, phishing attacks, system intrusions, and broader digital vulnerabilities fall under the umbrella of security risks. The definition of cybersecurity risk is constantly evolving, now encompassing threats related to artificial intelligence and AI-driven systems.If you’re trying to mitigate risks in this area, you need to think not just about…
-
10 key questions security leaders must ask at RSA 2025
Tags: access, ai, api, application-security, authentication, automation, business, cisa, ciso, cloud, conference, control, corporate, cve, cyber, cybersecurity, data, defense, detection, edr, endpoint, fido, finance, gartner, google, government, healthcare, infrastructure, microsoft, mitigation, mitre, monitoring, mssp, network, nist, passkey, password, phone, programming, resilience, risk, risk-management, service, software, strategy, switch, threat, tool, training, vulnerability, zero-trustIs agentic AI more myth than reality?: Building on 2024’s AI enthusiasm, this year will be all about agentic AI, defined as “a type of AI that enables software systems to act autonomously, making decisions and taking actions based on goals, with minimal human intervention,” according to AI itself (source: Google Gemini). We’ll see lots…
-
GRC Meets CRQ – Kovrr’s Quantified Cyber Risk Registe
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/grc-meets-crq-kovrrs-quantified-cyber-risk-registe/
-
How BluOcean Cyber Revolutionized SaaS Security and Risk Management
Learn how BluOcean overcame its client’s challenges with SaaS misconfigurations and how AppOmni’s SaaS security platform helped build a scalable, proactive SaaS security program. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/how-bluocean-cyber-revolutionized-saas-security-and-risk-management/
-
Using Post-Quantum Planning to Improve Security Hygiene
With careful planning, the transition to post-quantum cryptography can significantly improve security and risk management for the present and future. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/post-quantum-planning-security-hygiene
-
Making Compliance a Strategic Business Driver With AI
Tags: ai, awareness, business, compliance, cyber, cybersecurity, risk, risk-management, strategy, toolUNSW’s Pranit Anand on Personalizing Cyber Awareness Programs. Compliance programs can be more than tick-box exercises. When aligned with business strategy, cybersecurity awareness efforts become tools for improving continuity, profitability and risk management, said Pranit Anand, chief investigator at UNSW Business School. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/making-compliance-strategic-business-driver-ai-a-27959
-
Cloud-Sicherheit weiter lückenhaft
Der Siegeszug von Cloud- und SaaS-Lösungen schreitet unaufhaltsam voran doch viele Unternehmen verlieren dabei die Kontrolle über ihre Sicherheitslage. Eine aktuelle Studie zeigt: 28 Prozent der Unternehmen verzeichneten 2024 eine cloudbezogene Datenpanne, über ein Drittel davon sogar mehrfach innerhalb eines Jahres. Die Kluft zwischen technologischem Fortschritt und Risikomanagement wächst mit potenziell gefährlichen Folgen. First seen…
-
Design, implement, and deploy application protection policies with Cursor Agent – Impart Security
Tags: ai, application-security, breach, business, compliance, data, data-breach, detection, gartner, risk, risk-management, tool, wafIntroducing Impart + Cursor: Truly Autonomous Application Protection Runtime Security Without the Babysitting Security teams can now define application protection policies declaratively in Impart, with Cursor’s agent executing them safely and autonomously, eliminating the need for tedious clickops. Why This Matters Application protection has traditionally been a necessary burden. Security engineers find themselves trapped in…
-
10 best practices for vulnerability management according to CISOs
Tags: api, attack, automation, best-practice, business, ceo, cio, ciso, control, cybersecurity, data, detection, framework, group, incident response, metric, mitre, penetration-testing, programming, ransomware, risk, risk-management, service, software, strategy, technology, threat, tool, update, vulnerability, vulnerability-management1. Culture Achieving a successful vulnerability management program starts with establishing a cybersecurity-minded culture across the organization. Many CISOs admitted to facing historical cultural problems, with one summing it up well. “Our cybersecurity culture was pretty laissez-faire until we got hit with Log4J and then a ransomware attack,” he told CSO. “These events were an…

