I’m very excited to announce that I will be speaking at the Cyber Future Dialogue in two weeks in Davos, Switzerland during the World Economic Forum. This is going to be an amazing opportunity to converse with distinguished leadership from around the world on the necessity of and practical means to operationalize cyber risk quantification and the FAIR risk methodology.
Welcome to 2020!
I kept busy last month, even with the holidays. Here are some updates:
I wrote a piece for ISACA about how much spending is being done in aggregate for cyber security and how we need to rationalize the controls we are spending on.
The FAIR Institute called this my manifesto here :-)
I’m also really excited that my article on Cyber Risk Prospectuses was published over in ThreatPost. I’ve been talking about this topic for about a year now. I’m not a fan of us pretending that we work for companies that won’t get hacked. It’s not if its when and being clear about how long before we expect that loss is important. The FAIR Institute summarized my point succinctly: “Admit you will probably get breached.”
First off, I’m very pleased to announce that I will be presenting again next year at the RSA Conference. My session is called “Maturing Cyber-Risk Management Practices: Framework and Next Steps” (EZCL-R01). This will be done as a Collaborative Learning Session (a new RSAC format). I’ll lead a discussion then turn it over to the room to begin analyzing their risk management program and assessing its maturity.
Time for another cyber risk roundup!
As a part of my new role with RiskLens, I’ve been publishing several articles. Included here is a recap of my work over the past month:
- The ZombieLoad speculative execution bug raised the specter of a possible 40% hit in performance. I gave a plan to evaluate this new bug in the context of risk trade-offs here and here.
- For the @ISACA newsletter, I wrote about the importance of understanding business processes when conducting risk analyses. The specific list of business concepts I thought were important are included in the article here and RiskLens promoted it here (where they called me a security nerd LOL).
- I presented on integrating FAIR into the HITRUST CSF model along with Jason Martin from Highmark Health. The slides from this presentation are here.
- The new DHS Binding Operational Directive requires accelerated patching for critical and high security vulnerabilities. My thoughts on this are here for Homeland Security Today.