Part 2 - Looking at Non-Traditional Cyber Risks
Things to Put into Your Risk Registry: Part 2, Looking at Non-Traditional Cyber Risks Welcome back to the second part of our journey into...
Part 1 - Building an Effective Risk Registry
Unlocking the Potential of Your Risk Registry From Data Collection to Risk Analysis: Part 1 - Building an Effective Risk Registry...
Discussion of cyber risk within corporate walls
Please weigh in: How will the SEC's action affect the discussion of cyber risk within corporate walls? Email me or reply to this...
Achievement Unlocked: Relate Shark Week to Cybersecurity
In the vast ocean of pop culture, an intriguing connection exists between even the most unlikely subjects and the world of cybersecurity....
Interagency Connections: Strengthening Cybersecurity in an Interconnected World
Mitigating Risks in Interconnected Government Systems Imagine a scenario where a government agency, City A, with which your organization...
City Councils Are Having the Wrong Conversations About Cybersecurity
In the Harvard Business Review article "Boards Are Having the Wrong Conversations About Cybersecurity," authors Lucia Milică and Dr. Keri...
Cybersecurity Governance Unleashed: Empowering for Effective Risk Oversight
In today's world, cybersecurity is a crucial part of any business. As organizations become more reliant on technology, they become more...
The Psychology of Cybersecurity: How Our Minds Distort Our Perception of Cyber Risk
When I attended the RSA conference in 2022, I tweeted about the intersection of psychology and cybersecurity. While most of the responses...
Reporting to Council: Why Local Governments Should Use the NIST Cybersecurity Framework
The blog post discusses how the NIST Cybersecurity Framework can be an effective tool for reporting on cybersecurity to council members.
Webinar: The Board or Council's Role in Cyber Risk Management
The Board or Council's Role in Cyber Risk Management (encore performance, first presented at MISAC Conference October 2022 in Monterey,...