I recently wrote this piece for ISACA on business process maps. Clearly, this is tongue in cheek – there are a lot of benefits to building a map of business processes and for a security professional, these maps can become the basis of lots of security and risk reporting. You can read my thoughts onContinue reading “Business Process Maps are Boring”
Category Archives: @ISACA
Learning From Other’s Mistakes
I wrote this piece after I read one person’s take on the relationship between near misses and audit findings. I wanted to reflect my thinking on the matter in a way that gave risk organizations a useful function to pursue after an incident. You can read about the role that your near misses (and other’s)Continue reading “Learning From Other’s Mistakes”
ICYMI: Digital Trust and Improving Risk Programs
For my final update this year, I want to discuss my last two pieces for the @ISACA newsletter and ISACA Now Blog. The first is a piece on how Cyber Ratings are quickly becoming a standard for measuring digital trust. As the investor community wants more insight into which firms have a greater propensity forContinue reading “ICYMI: Digital Trust and Improving Risk Programs”
Cyber Insurance Market Analysis
I wrote this piece as an analysis of what Marsh is experiencing in the marketplace. I wanted to have a cyber risk analyst’s take on the same data and to see where we could learn from their analysis and apply that in our practice. One edit, it looks like I made a typo. The lineContinue reading “Cyber Insurance Market Analysis”
Rise of the Chief Trust Officer
I wrote a piece for ISACA about how the rise of the Chief Trust Officer role is changing the landscape for cyber security and cyber risk leadership. Borrowing from the CISO, CSO, CPO, CIO, and digital transformation roles, the Chief Trust Officer can become the go to role to govern technology and ensure customer’s trustContinue reading “Rise of the Chief Trust Officer”
The Future of Quantitative Cyber Risk Reporting
In my latest piece for the @ISACA newsletter, I address the US SEC’s interest in enhancing the cyber risk reporting requirements. The SEC has asked for feedback on this matter from the public. I used my feedback to them in the writing of this piece.
Cyber Risk Warehouse – 2022 April YTD ICYMI
I have a “warehouse” full of good cyber risk things to share with you below: Here is an ISACA piece I was asked to write about things Cyber Risk professionals need to focus on in 2022 This ISACA column I wrote speaks to the role that bias plays in how cyber news is fed toContinue reading “Cyber Risk Warehouse – 2022 April YTD ICYMI”
Cyber Resilience & Board Communication Interview
My piece on Cyber Resilience was recently published by ISACA. Note that their style guide requires that everything with cyber in it be a compound word which makes it read weird. I had a good laugh with them about this. They also interviewed me for ISACA TV on communicating cyber risk to the board andContinue reading “Cyber Resilience & Board Communication Interview”
ISACA CRQ Whitepaper, a Webinar, and More CRQ
A whitepaper I recently wrote for ISACA was published. You can access it here. In this paper I wanted to write about how cyber risk quantification worked broadly, not just in a FAIR context. I hope it gives you a good primer to this topic. I’m also doing an ISACA webinar with my good friendContinue reading “ISACA CRQ Whitepaper, a Webinar, and More CRQ”
Risk Treatment
My latest @ISACA post talks about how there is a lack of parallelism in the way that organizations apply Risk Treatment. In short, the lower in the organization you are the less real options that you have. You can read the article here