Two weeks ago I was named a Distinguished Fellow of the ISSA. It’s really a great honor for me as I really didn’t think I was qualified. Thanks to everyone who made this possible, including Clarke Cummings for getting me involved in the ISSA to begin with and to Joel Weise for helping with my application.
Cyentia Xtreme
In case you missed it, the Cyentia Institute published the IRIS2020 Xtreme report. I was very happy to have written the conclusions for this report. In it, I speak about how the data in the report can be useful for Board Directors. You can read the full report here.
Dark Reading quoted me in their coverage here as did Duo Security here.
Pandemic Lessons and Record Count
I was asked to write a piece for ISACA about cyber risk in the Pandemic. I used some popular memes as a bouncing off point to talk about how to manage risk in these crazy times. You can read this here.
I also had my article about why using record counts as your risk appetite is a bad idea. You can read this here.
Lastly, there was some more press on the (ISC)2 Award I won:
https://www.infosecurity-magazine.com/news/hacker-princess-wins-diversity/
https://www.helpnetsecurity.com/2020/08/17/2020-isc2-global-achievement-awards/
ISC2 Global Award
I’m pleased to announce that I have been honored with an ISC2 Global Award in the Senior Professional Award category for the work I’ve done integrating FAIR into the NIST CSF framework. Many thanks to the FAIR Institute for their support and for ISC2 for these awards programs.
Positive Risk, ISACA Journal, and more NIST
ISACA asked me to write a short piece on my Journal article about risk communication. They published that here.
I also wrote a blog post for the @ISACA newsletter about the trouble with positive risk.
Lastly, NIST released an update to their ERM-Cyber integration standard and my friends at the FAIR Institute asked me to comment on it, so I wrote a short piece here.
Cyber Risk Frameworks, MITRE ATT&CK, and Risk Communication in the ISACA Journal
Welcome to your April-May Cyber Risk Update!
- I was asked to write a piece about how umbrella frameworks like NIST can be incomplete without detailed implementation guidance, but also how such detailed methodologies like CVSS were also lacking. The result was this piece I wrote for the FAIR Institute.
- I was also pleasantly surprised to discover that NIST released an IR draft that referenced FAIR directly as a way to tie together cyber risk and enterprise risk. You can read my hot take on this here and read the standard here.
- I was very honored to be able to speak at the Inaugural Volatility and Risk Institute Conference hosted by NYU Stern, where I was interview by the inestimable Phil Venables. He write his thoughts about this here and you can watch the interview here, where you can see my amazing Zoom background (h/t to Digital Blasphemy where I’ve been a lifetime member since the late 90s)
- Here is a piece I wrote for Dark Reading where I describe how to integrate MITRE ATT&CK into your risk modeling
- Lastly my article on Risk Communication was published in this month’s ISACA Journal, available here. It was published as a feature article in their Human Element of Risk issue.
85.7% COVID-19 Free March Update!
RSA Roundup
Updates on the Monday all-day FAIR session I did with Jack Jones, Chad Weinman, and Rachel Slabotsky, as well as my Thursday session on maturing your risk management practice.
- RSAC 2020 Report – Big Turnout for 2 FAIR Seminars, Breakfast Advice on Starting a FAIR Program from Jack Jones and Fannie Mae, Ascena Retail CISOs
- At RSA Conference 2020, Demand for Risk Quantification and FAIR Everywhere
- You Attended the FAIR™ Seminar at RSA Conference 2020 – Here Are Next Steps to Start Your FAIR Program
I was quoted in Financial Management Magazine here as I talked about expressing cyber risk in financial terms. RiskLens wrote about this here.
My panel session at the Cyber Future Foundation in Davos was posted online, you can watch it here:
And lastly, everyone’s business continuity plans are being stress tested this week and I imagine that there is going to be a heightened interest in BC/DR once this is all done. I did a quick podcast interview on how to factor in the Coronavirus into your cyber risk planning.
Feb Update! Davos, NIST, Cloud Smart, and Risk Mgmt Maturity
Happy February everyone!
First off, here was my recounting of my time in Davos last month. It was a good event with lots of fascinating people, each an expert in their field.
Ian Amit (CISO, Cimpress) and I held a webinar about integrating FAIR with NIST. You can access that on-demand here.
I wrote an article about application rationalization during cloud migration for Homeland Security Today. It’s focused on the Federal Cloud Smart policy, but if you look closely, you’ll see this applies to virtually every organization. The FAIR Institute wrote about this article here.
I was quoted in Risk Management, a publication of RIMS on some predictions I made (Boards are going to be pressed for more risk quantification).
Lastly, I finalized the Risk Management Maturity Report for the FAIR Institute. You can read this here.
Speaking at the Cyber Future Dialogue in Davos during the World Economic Forum (WEF)
I’m very excited to announce that I will be speaking at the Cyber Future Dialogue in two weeks in Davos, Switzerland during the World Economic Forum. This is going to be an amazing opportunity to converse with distinguished leadership from around the world on the necessity of and practical means to operationalize cyber risk quantification and the FAIR risk methodology.
Welcome to 2020! Cyber Risk Prospectuses and a “Manifesto”
Welcome to 2020!
I kept busy last month, even with the holidays. Here are some updates:
I wrote a piece for ISACA about how much spending is being done in aggregate for cyber security and how we need to rationalize the controls we are spending on.
The FAIR Institute called this my manifesto here :-)
I’m also really excited that my article on Cyber Risk Prospectuses was published over in ThreatPost. I’ve been talking about this topic for about a year now. I’m not a fan of us pretending that we work for companies that won’t get hacked. It’s not if its when and being clear about how long before we expect that loss is important. The FAIR Institute summarized my point succinctly: “Admit you will probably get breached.”