article thumbnail

Five Strategies to Protect Against Ransomware and Other Cyberattacks

Risk Management Monitor

As organizations continue to adapt to remote or hybrid work models, it has never been more vital to have a robust cybersecurity program to better protect against ransomware attacks and other cyberattacks against company systems and personnel. Strengthen Asset Inventory You cannot protect what you do not know exists or cannot see.

Alert 76
article thumbnail

Adversarial Risk Management

FS-ISAC

We chase concepts that seem simple, such as "basic" network hygiene, asset management, and patching. But these approaches rely on tenets based on traditional operational and financial risk management. While “close enough” works in asset management for financial inventory, it can quickly prove useless in cybersecurity.

article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

That’s why insurance premiums are increasing exponentially for those organizations that cannot provide evidence of an effective ERM program that has strong controls and a robust Incident Response program. Asset Management. Steven Minsky is a recognized thought leader in risk management , CEO and Founder of LogicManager.