Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Enterprise Risk Management, Cybersecurity Oversight and Cyber Risk's Future, with James Lam

Автор: FAIR Institute

Загружено: 2018-12-10

Просмотров: 4846

Описание:

At the recent 2018 FAIR Conference, James Lam, the enterprise risk management and corporate governance authority and chairman of the risk committee for the E*TRADE board of directors, gave a master class on where cyber risk has been, where it’s going as part of ERM—and what board members want to hear right now from CISOs about cyber risk.

Watch this video of his FAIRCON Day Two Keynote speech to lift your perspective on the risk profession to a higher, board-level view.

Among the points James covers:

To understand the future of cybersecurity risk management look to the past of other risk disciplines. Financial risk, market risk, credit risk, strategic risk managers all once held the belief that risk couldn’t be effectively measured – still a common view in cyber. James explains how they solved the problem and how cyber risk management will too.

Risk management is about optimizing a bell curve. A curve with downside risk on one side, upside risk on the other and expected performance in the middle. Typically, cybersecurity professionals think of the downside only when really, they should be balancing all sides – James walks you through this concept with charts.

Cybersecurity risk must be managed as part of enterprise risk. That’s how the board wants to understand cyber risk and that has some important implications: Cyber needs to have a price on it so it can be compared to other risks the enterprise faces and be priced into products and services. And inforisk can’t be managed in a silo when it really affects and is affected by other types of risk.

“We need to shift our branding from just loss identification and minimization to how do we add value, how do we grow the business.” Most cybersecurity professionals start their thinking “from the threat environment and how they can enhance the security environment…Instead, think about what are the key decisions we need to make on security investments, cyber insurance, etc. then work backwards to ask how do we make better investments.”

Among many other topics, James also discusses

The cybersecurity metrics that boards do want to hear (hint: not including NIST CSF maturity reports)
How enterprise risk management is moving from quarterly to continuous reporting mode (and cyber risk reporting should too)
How FAIR and risk quantification are critical to the forward path of infosecurity risk management
James ends with this thought about the future: “I’d like for us to go from cybersecurity to cyber risk to cyber value." And he explains how Bruce Lee will show us the way (you'll have to watch the video for that one).

Enterprise Risk Management, Cybersecurity Oversight and Cyber Risk's Future, with James Lam

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Reporting Cyber Risk to the Board: Real Life Examples

Reporting Cyber Risk to the Board: Real Life Examples

Understanding risk appetite

Understanding risk appetite

Learning from the Best (Board) – James Lam, Full Episode

Learning from the Best (Board) – James Lam, Full Episode

Cyber Risk Management: Essentials for the Practical CISO

Cyber Risk Management: Essentials for the Practical CISO

Webinar - How to Implement an Enterprise Risk Management Framework (Jerry Hughes)

Webinar - How to Implement an Enterprise Risk Management Framework (Jerry Hughes)

Как работала машина

Как работала машина "Энигма"?

New paradigms in enterprise risk management

New paradigms in enterprise risk management

Factor Analysis of Information Risk (FAIR) Introduction by Jack Jones

Factor Analysis of Information Risk (FAIR) Introduction by Jack Jones

The Future of Cyber Resilience and Risk Management: Tackling AI and Business Continuity

The Future of Cyber Resilience and Risk Management: Tackling AI and Business Continuity

The First 6 Months as a CISO Determines Success or Failure

The First 6 Months as a CISO Determines Success or Failure

Введение в кибербезопасность | Обучение кибербезопасности для начинающих | CyberSecurity | Simpli...

Введение в кибербезопасность | Обучение кибербезопасности для начинающих | CyberSecurity | Simpli...

The Next Frontier in Risk Management with Jack Jones, author of Factor Analysis of Info Risk (FAIR)

The Next Frontier in Risk Management with Jack Jones, author of Factor Analysis of Info Risk (FAIR)

Balancing The Three Lines Of Defense - A Discussion on Risk Management

Balancing The Three Lines Of Defense - A Discussion on Risk Management

Measuring Cybersecurity Maturity with the NIST CSF - Josh Sokol

Measuring Cybersecurity Maturity with the NIST CSF - Josh Sokol

Developing Risk Appetite Statements Ian Beale

Developing Risk Appetite Statements Ian Beale

Implementing a Quantitative Cyber-Risk Framework: A FinSrv Case Study

Implementing a Quantitative Cyber-Risk Framework: A FinSrv Case Study

Understanding Cybersecurity Risk Management

Understanding Cybersecurity Risk Management

Cyber Risk Quantification: The Bald Tire Scenario with Jack Jones

Cyber Risk Quantification: The Bald Tire Scenario with Jack Jones

Risk & Control Self-Assessments: How to unlock enterprise value

Risk & Control Self-Assessments: How to unlock enterprise value

A CISO’s Guide to an Effective Cybersecurity Metrics Program

A CISO’s Guide to an Effective Cybersecurity Metrics Program

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]