Cybergovernance Journal Update – 6/17/2016
The quantification of cyber risk is a hot topic as companies and organizations seek to insure themselves against security breaches. But that is not the end of the process. Having a value at risk model applied to a company can lead to competitive advantages and operational efficiencies.
The Opportunity Inherent in Cyber Risk
Cybergovernance Journal, June 13
Cyber risk offers an opportunity not just to solve the problem, but to turn the marketplace energy around cyber risk into an advantage for every organization. Effective cyber risk governance (cybergovernance) creates two predominant advantages…
What CISOs Need to Tell the Board About Cyber Risk
Information Week, June 15
To avoid devastating financial losses, boards and the C-suite must have a deep understating of the cyber risks their organizations’ face. Here’s what they need to hear from the security team…
Lockton’s Ben Beeson Named “Cyber Champion of the Year”
Advisen, June 16
Advisen’s Cyber Risk Awards have become the most prestigious honors in the cyber community. The number of nominations and votes were up more than 50% from last year, demonstrating the level of excitement for these awards. Ben Beeson received the 2016 Advisen Cyber Champion of the Year award for his outstanding contributions…
Cyber Insurance is Changing the Way We Look at Risk
TechCrunch, June 13
We may see insurance companies open cybersecurity departments and offer pre-breach and post-breach services, such as security architectural analysis, monitoring, incident response, forensics and more. If this happens, we will likely see insurance companies start hiring cybersecurity specialists and even “acqui-hiring” cybersecurity startups…
NIST Updates Its Cybersecurity Framework
MeriTalk, June 10
NIST has updated its Cybersecurity Framework in response to user comments that the original framework was too vague in its Implementation Tiers, the measure by which organizations gauge their approach to managing cybersecurity risk…
Hackers Find Over 100 Bugs in U.S. Defense Systems
The Hacker News, June 14
In March, the Defense Department launched what it calls “the first cyber Bug Bounty Program in the history of the federal government,” inviting hackers to take up the challenge of finding bugs in its networks and public faced websites…
Subscribe
Be notified of new Journal entries in your email box or Follow us on Twitter.