Cybergovernance Journal Update – 7/1/2016
There is growing acceptance that cyber risk is a part of doing business. But how can a company or organization accurately gauge an acceptable level of risk?
Who’ll Be the Gap Closer in Cyber Insurance?
Cybergovernance Journal, June 27
A common model and vocabulary can close the chasm between the cybersecurity and cyber insurance communities, but who’s in the best position to bring all the stakeholders together?
UK CyberSec Governance Still in Good Hands Despite Brexit
Infosecurity, June 24
As the dust settles and the realities of the Brexit start to kick in, it has left many in the industry pondering what it means for the future of cybersecurity and privacy governance, with concerns surrounding the upcoming General Data Protection Regulation…
Survey: Risky LinkedIn Behavior Runs Rampant
SC Magazine, June 24
New research on LinkedIn and social media habits shows that many users are guilty of indiscriminately connecting with online strangers, potentially opening them up to spear phishing schemes and business email compromise (BEC) scams…
Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey
sans.org
Results of this survey, conducted in conjunction with Advisen, Ltd., make it clear that the effort to achieve a common understanding of cyber insurance and derive value from it will require focused attention from all sides. This study also sets a direction toward a common, achievable goal…
Gartner: 60% Digital Businesses Face Service Failures by 2020
Economic Times, June 6
“Organizations will learn to live with acceptable levels of digital risk as business units innovate to discover what security they need and what they can afford. Digital ethics, analytics and a people-centric focus will be as important as technical controls,” added Paul Proctor, Vice President and Distinguished Analyst at Gartner.
655,000 Healthcare Records Being Sold on Dark Web
ThreatPost, June 28
A hacker selling upwards to 655,000 healthcare records on the dark web allegedly obtained them after exploiting a vulnerability in how companies implement remote desktop protocol, or RDP, functionality…
Subscribe
Be notified of new Journal entries in your email box or Follow us on Twitter.