Remove Asset Management Remove Evaluation Remove Insurance Remove Management
article thumbnail

Adversarial Risk Management

FS-ISAC

We chase concepts that seem simple, such as "basic" network hygiene, asset management, and patching. But these approaches rely on tenets based on traditional operational and financial risk management. While “close enough” works in asset management for financial inventory, it can quickly prove useless in cybersecurity.

article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

Colonial Pipeline Hack: Failure in Risk Management. For example, a forensic finding made during an evaluation of Colonial Pipeline noted numerous known and preventable vulnerabilities, such as unpatched and outdated systems, that likely led to the security breach. This will also uncover poor management of privileged user accounts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Peer-Benchmarked Threat Resilience Metrics

FS-ISAC

It would be nice to have a clear answer for senior management and regulators about threat resiliency. The Index is facilitated by long-time FS-ISAC sponsor Security Risk Advisors, but it is developed by a wide group of intel, red, and fusion center leads from retail banks, asset managers, fintechs and insurers.

article thumbnail

Peer-Benchmarked Threat Resiliency Metrics

FS-ISAC

It would be nice to have a clear answer for senior management and regulators about threat resiliency. The Index is facilitated by long-time FS-ISAC sponsor Security Risk Advisors, but it is developed by a wide group of intel, red, and fusion center leads from retail banks, asset managers, fintechs and insurers.