5 Steps to Defending Your Bottom Line with a Cyber Risk Protection Plan

Protect Your Balance Sheet from Cyber Attacks Cyber risks are now a certainty. Firms, in every industry and of every size, should be managing these risks as much as (if not more than) all other risks to their business: economic, competitive, operational, etc. More than 40 percent of respondents to the Marsh-Microsoft 2019 Global Cyber Risk Perception Survey believed they cou [...]

Keep Reading

A New Strategy for CEOs on the Cybersecurity Battlefield: Part 1

Gartner’s new article, 8 Reasons More CEO’s Will Be Fired Over Cybersecurity Incidents, sheds light on a handful of critical challenges CEOs have when managing cybersecurity. It is a compelling read, one that led me to wonder, does this have to be the reality? Is there something we can do to change this course? These are heavy, complex questions. And, they will be differ [...]

Keep Reading

Definitive Guide to Cyber Risk Analytics: Chapter 1

In this chapter, you will: • Understand why cyber risk is a business problem • Recognize the challenges of communicating cyber risk • See why cyber risk analytics is a business imperative “If no mistakes have you made, yet losing you are, a different game you should play.” ― Yoda. It’s a vicious cycle. Hacker motivations have risen to new levels and [...]

Keep Reading

Understanding business priorities is key in justifying security spend

Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice would you give them?” Genady Vishnevetsky (chief information security of [...]

Keep Reading

Why the CFO and CISO need to get along

Business exists as a system to capture and expand revenue. At the heart of this system is the relationship between the CFO and the CISO. The CFO is eager to remove all barriers to revenue. In many cases, removing those barriers make the business harder for the CISO to protect. Success in the near future for businesses will be dictated in large part by the abilities of the CFO a [...]

Keep Reading

To Quantify Cyber Risk, Assess Potential Loss Events

Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice would you give them?” Vicky Ames, Director of Information Security at [...]

Keep Reading

An Executive Level Steering Committee is Critical to CISO Success

Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice would you give them?” Before making a case for security expenditures t [...]

Keep Reading

Guest Post: 7 Cyber Risks to Watch Out For in 2019

2018 was an eventful year that brought various security breaches, many of which made headlines. The year proved that even large organizations fall into the hands of hackers. This is why cybersecurity is among the top current internet issues that have been stressing business leaders constantly. There are a lot of threats to expect in 2019, and if we make the effort to avoid t [...]

Keep Reading

Guest Post: $60M Question – How much does a cyber breach cost an organization?

There is no simple answer. When asked to quantify the cost of a breach, security experts will take one of two paths: they will 1) Choose to calculate the breach cost (which sends them down a complicated path), or 2)  Decline to calculate. Remember what happened to Lincolnshire County Council in the UK in 2016? At this time, 300 endpoints were infected resulting in four days [...]

Keep Reading

Cyber Risk Prioritization Framework: Part One

You may have heard of the book “7 Habits of Highly Effective People.” This 30 year old book written by Steven Covey lays out an approach to being effective in work and in life. For you “Covey nerds,” here is a refresher on the 7 Habits: 1) Be proactive 2) Begin with the end in mind 3) Put first thing first 4) Think win-win 5) Seek first to understand, th [...]

Keep Reading