article thumbnail

Adversarial Risk Management

FS-ISAC

You can hire a professional audit firm to benchmark the bucket against peer buckets. As Board Directors and corporate executives around the world grapple with increasing cyber risk, we’ve historically focused on "bottom-up" cyber strategies based on compliance frameworks. Or you could fill it with water. What is Your Adversary's Goal?

article thumbnail

What’s Changed: 2021 Gartner Magic Quadrant for IT Risk Management

Solutions Review

The editors at Solutions Review highlight what’s changed since the last iteration of Gartner’s Magic Quadrant for IT Risk Management and provide an analysis of the new report. has released its 2021 Magic Quadrant for IT Risk Management. Analyst house Gartner, Inc. Rounding out the leaders are SAI360 and NAVEX Global.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

If Cyber is Material, Then Boards are Accountable

FS-ISAC

Cybersecurity has become a critical topic for boards of directors for several reasons. First, cybersecurity is now an existential issue, intrinsically tied to staying competitive in the market. Second, regulators are increasingly indicating that ultimate accountability for cyber risk management rests with the board.

article thumbnail

How CISOs Can Reduce Third-party Attack Vectors

Pure Storage

To help, a new class of tools has appeared on the market: Third-party cybersecurity risk management (TPCRM) platforms can help manage both assessment and ongoing monitoring. In-depth questionnaires and even independent audits might be appropriate, but the process should be thorough.

Audit 52
article thumbnail

Important KPIs for Successful Vendor Management

Reciprocity

Every risk management program should include risks posed by your vendors. Beware, however: vendor risk management is a complex process unto itself, requiring ongoing monitoring and measurement. What Are Vendor Risk Management Metrics? What Are the Most Common Vendor Risks? Cybersecurity.

article thumbnail

3 Steps to Prepare for 2024 and Beyond with the Risk Maturity Model

LogisManager

3 Steps to Prepare for 2024 and Beyond with the Risk Maturity Model The world is becoming increasingly complex and uncertain, and organizations must be prepared to face a wide range of risks that could impact their success. In uncertain times, it is crucial to have resources to analyze and demonstrate risks.

article thumbnail

3 Steps to Prepare for 2024 and Beyond with the Risk Maturity Model

LogisManager

3 Steps to Prepare for 2024 and Beyond with the Risk Maturity Model The world is becoming increasingly complex and uncertain, and organizations must be prepared to face a wide range of risks that could impact their success. In uncertain times, it is crucial to have resources to analyze and demonstrate risks.