by Charles Leonard | Jun 7, 2017 | Cyber Risk
The aftermath of a cyber breach always involves a technical discussion around the specific failures that gave rise to the incident. This discussion can be difficult for non-technical leaders to engage in, which is frustrating given those same leaders are being held...
by Charles Leonard | Dec 12, 2016 | Cybersecurity
The underpinnings of an information sharing program are taking shape all around us. In the world of cyber threats, bad actors far outnumber good ones. The number of potential attack vectors exceeds the capacity of any defender to effectively guard all vulnerabilities....
by Charles Leonard | Jun 13, 2016 | Cyber Risk
Cyber risk represents not just a threat, but an opportunity. The upside will materialize in two ways: competitive advantage and operational efficiency. The rapid ascent of cyber threats and risks to the pantheon of topics considered “board-level issues” has created a...
by Charles Leonard | Mar 14, 2016 | Cybersecurity
In the first part of this series we explored the composition of “risk”: 1) the probability of a certain event, and 2) an estimation of that event’s potential impact. This piece will dig a little bit into the relationship between risk pricing and risk appetite. There...
by Charles Leonard | Mar 7, 2016 | Cybergovernance, Cybersecurity
Cyber risk has no obvious shape or size. That’s why it’s such a thorny problem – it is exceedingly difficult to pinpoint factors that drive risk. As a result, it is nearly impossible to build actuarial models that present a reasonably accurate depiction of expected...