article thumbnail

Peer-Benchmarked Threat Resilience Metrics

FS-ISAC

It would be nice to have a clear answer for senior management and regulators about threat resiliency. While we’re at it, a single quantitative score to describe threat resilience would be fantastic. And could we get that benchmarked against our peers? You can use a spreadsheet, but it’s not recommended.

article thumbnail

Peer-Benchmarked Threat Resiliency Metrics

FS-ISAC

It would be nice to have a clear answer for senior management and regulators about threat resiliency. While we’re at it, a single quantitative score to describe threat resilience would be fantastic. And could we get that benchmarked against our peers? You can use a spreadsheet, but it’s not recommended.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How CISOs Can Reduce Third-party Attack Vectors

Pure Storage

The last year has seen such attacks hit Bank of America , Home Depot, T-Mobile , Okta , and Citrix. A model for regulation could be the EU’s Digital Operational Resilience Act (DORA) , which strengthens and standardizes IT security and compliance for financial entities such as banks, insurance companies, and investment firms.

Audit 52
article thumbnail

3 Steps to Prepare for 2024 and Beyond with the Risk Maturity Model

LogisManager

These strategies will help you navigate uncertainties and improve your organization's resilience and performance in the years ahead. #1 By benchmarking your ERM program's effectiveness using the RMM, you can provide an objective assessment of where your organization stands compared to peer industries.

article thumbnail

3 Steps to Prepare for 2024 and Beyond with the Risk Maturity Model

LogisManager

These strategies will help you navigate uncertainties and improve your organization's resilience and performance in the years ahead. #1 By benchmarking your ERM program's effectiveness using the RMM, you can provide an objective assessment of where your organization stands compared to peer industries.

article thumbnail

Singing the Same Tune: The Case for Regulatory Harmonization

FS-ISAC

While cybercrime has been around for decades, the 2016 cyber heist against Bangladesh Bank was a watershed moment for financial authorities around the world. FMIs such as EBA CLEARING are already subject to unified standards under the European Central Bank’s (ECB) Cyber Resilience Oversight Expectations (CROE) published in December 2018.

article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

Here are some common methods: Credential Stuffing: This is when attackers use stolen or leaked usernames and passwords from one site on another, banking on the fact that many people reuse passwords across multiple sites. Use CIS-benchmarked components Use CIS hardened containers, platforms (Kubernetes), AWS, databases/storage (Mongo, S3).