cybersecurity vulnerabilities

How to Eliminate 63% of Your Cybersecurity Vulnerabilities in 90 Days

Cybersecurity vulnerabilities are a concern for every company in every industry. In 2016, 4.2 billion records were stolen during 4,149 reported data breaches. This doesn’t take into account breaches not noted in the public record. According to a Ponemon Institute survey, while security incidents have expensive consequences, costs associated with reputational damage are even greater. That explains…

Strategic ERM

What’s Changing in the Approach to IT GRC?

Increasing cyber-hazards have been accompanied by another trend; Governance, Risk Management, and Compliance (GRC) focused on IT (referred to as IT GRC) is changing. More and more organizations have been turning to a risk-based approach. Traditionally, IT is comprised of a variety of underlying functions. These functions include: IT Asset Management, commonly used to inventory…

regulatory organizations targeting cybersecurity risk management

OCC Targets Cybersecurity and AML Deficiencies – ERM is the Answer

The OCC released its “Semiannual Risk Perspective” and, perhaps as anticipated, banks continue to struggle plugging gaps in information technology practices. Among the risks highlighted in the study, as reported by Joe Mont at Compliance Week: Evolving cyber-threats and information technology vulnerabilities require heightened awareness and appropriate controls. The high volumes and frequency of changes…

realizing the inpact of unidentified risks and cybersecurity threats

Healthcare Organizations are Falling Behind, and ERM is the Solution

Healthcare organizations manage an almost unimaginable amount of sensitive data, and industry experts say they aren’t doing enough to protect it. For their 2015 Vendor Risk Management Benchmark Study, The Shared Assessments Program surveyed nearly 500 professionals for insight into risk management practices across various industries. The findings show that healthcare organizations come up short…

cybersecurity defenses

Cybersecurity Attacks: Are you at Risk?

An in-depth investigation by the non-profit analysis organization RAND reveals that hackers and their attacks are maturing at a much more rapid pace than organizations’ cybersecurity programs. Hackers now regularly and successfully plan sophisticated attacks to gain valuable information from large, well established organizations. In June 2015, Tony Scott, the CIO of the federal government, stated…

cyberattack prevention

Experts: Cyber Risk Management Requires Enterprise-Wide Governance

Online media outlet TechTarget recently visited the 2014 Advanced Cyber Security Center (ACSC) conference right in our hometown of Boston, MA. Their findings? A successful cybersecurity risk management framework must be built around “Coordination. Cooperation. Collaboration.” “You are not going to eliminate the risk of attacks, you are going to manage the risk,” said Michael…