Cybersecurity Leadership
21.0K views | +0 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

How to create an efficient governance control program

How to create an efficient governance control program | Cybersecurity Leadership | Scoop.it

At its heart, governance should be about security practices and focus on risk mitigation as a security concept rather than as a compliance driver. Compliance will be a by-product of good security practices that can be guided by security governance frameworks.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Governance, Compliance and Window-Dressing: Cyber resilience needs clear accountability from the top

Governance, Compliance and Window-Dressing: Cyber resilience needs clear accountability from the top | Cybersecurity Leadership | Scoop.it
Without clear accountability from the top, cyber compliance invariably descends into box-checking and window-dressing
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Navigating the New Risks and Regulatory Challenges of GenAI

Navigating the New Risks and Regulatory Challenges of GenAI | Cybersecurity Leadership | Scoop.it

The use of generative AI promises to continue to grow rapidly. Consequently, leaders must understand the risks and challenges of this new technology and develop policies and practices to guide its usage.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Assessing the need for global cybersecurity regulations

Assessing the need for global cybersecurity regulations | Cybersecurity Leadership | Scoop.it

Cybersecurity regulations have become complicated, costly and difficult to secure due to the web of national and regional regulations that have developed in recent years.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Key Ingredients Of A Successful GRC Program

The Key Ingredients Of A Successful GRC Program | Cybersecurity Leadership | Scoop.it
A governance, risk and compliance program has to start with a degree of integration between threats, risks, controls and protective measures.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Two Factors Killing GRC Practices

The Two Factors Killing GRC Practices | Cybersecurity Leadership | Scoop.it
Excessive complexity and lack of first line integration render many GRC metrics useless. Simplicity and collaboration are key to success
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why the Benefits of GRC Are Slow to Materialize

Why the Benefits of GRC Are Slow to Materialize | Cybersecurity Leadership | Scoop.it
For the last decade, overall governance risk and compliance program development has progressed, but the return on investment has indeed remained flat or negative. Why are the benefits of GRC technology spend so slow to materialize?
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How to Promote a Risk-Aware Climate in a Risk-Averse Environment

How to Promote a Risk-Aware Climate in a Risk-Averse Environment | Cybersecurity Leadership | Scoop.it
Driving change in risk culture is difficult, and it always takes time. The payoff can be huge, however. Gartner’s Matt Shinkman and Chris Matlock discuss.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Delegating Cyber Risk Management With the Three Lines of Defense Model

Delegating Cyber Risk Management With the Three Lines of Defense Model | Cybersecurity Leadership | Scoop.it
The Three Lines of Defense model enables board directors to be involved in the cyber risk management process without micromanaging the security team.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Do internal audit departments focus on what matters. Survey says they do not

Do internal audit departments focus on what matters. Survey says they do not | Cybersecurity Leadership | Scoop.it
The 2017 Internal Audit Planning and Staffing Priorities Report from MISTI shares the results of a survey of more than 600 internal auditors in North America. (I am not sure the results would be much different if the survey obtained responses from a global group.) I can't say that the results are surprising. Disappointing, perhaps, but not surprising.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

GRC: The “Three Lines of Defence” model only works on Trust

GRC: The “Three Lines of Defence” model only works on Trust | Cybersecurity Leadership | Scoop.it
Hybrid operating models can work and bring value around GRC but as long as the dynamics of trust and efficiency are preserved.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Managing Risk or managing risks?

Managing Risk or managing risks? | Cybersecurity Leadership | Scoop.it
There are many risk management methodologies in existence but too many large firms are still following today simplistic, dysfunctional or flawed practices
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why governance, risk, and compliance must be integrated with cybersecurity

Why governance, risk, and compliance must be integrated with cybersecurity | Cybersecurity Leadership | Scoop.it
With pressure from regulators, evolving threats and the need for stronger oversight, integrating cybersecurity risks into GRC programs requires alignment between both areas.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Governance By Design: Three Case Studies On Privacy, Security And GRC

Governance By Design: Three Case Studies On Privacy, Security And GRC | Cybersecurity Leadership | Scoop.it
In all cases, governance by design takes humility, patience and iterations.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

New SEC rules for reporting cybersecurity incidents serves investors, not CISOs

New SEC rules for reporting cybersecurity incidents serves investors, not CISOs | Cybersecurity Leadership | Scoop.it

The new SEC rules will put more pressure on CISOs and security teams to stay transparent about their security governance – and that’s a good thing.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Key Ingredients of a Successful GRC Programme

The Key Ingredients of a Successful GRC Programme | Cybersecurity Leadership | Scoop.it
Successful GRC programmes are focused on the integration between threats, risks, controls & protective measures
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Changing Profile of the CISO: New Roles, New Demands, New Skills

The Changing Profile of the CISO: New Roles, New Demands, New Skills | Cybersecurity Leadership | Scoop.it
Over the last two decades the role of CISO has evolved beyond technical IT security to become pivotal in risk, compliance, and governance.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Information Security Risk – Keeping it simple

Information Security Risk – Keeping it simple | Cybersecurity Leadership | Scoop.it
Organisations should start with risk management to understand information security risks and communicate them better internally
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How to Manage Cyber-Whistleblower Risk

How to Manage Cyber-Whistleblower Risk | Cybersecurity Leadership | Scoop.it
Companies should pay specific attention to risks arising from the increasingly common whistleblower complaints regarding data breaches and cybersecurity.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Lack of investments in GRC holding back cyber security maturity

Lack of investments in GRC holding back cyber security maturity | Cybersecurity Leadership | Scoop.it
62% of enterprises without IT GRC solutions report low security readiness, as opposed to only 25% of those with IT GRC solutions
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Positioning Independent Risk Management to Succeed

Positioning Independent Risk Management to Succeed | Cybersecurity Leadership | Scoop.it
Protiviti’s Jim DeLoach offers insight into some of the key changes organizations can make to position their risk management experts for success.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Thomson Reuters Top 30 UK Social Influencers in Risk, Regulation and RegTech 2017 #TRRiskUK30

Who are the most influential social media thought-leaders and thinkers, focusing in risk management, compliance and regtech in the UK? Our list ranks th
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Embedding risk into strategic planning

Embedding risk into strategic planning | Cybersecurity Leadership | Scoop.it
It is easy to say that risk management should be embedded into business processes such as strategic planning. But is it that easy to accomplish in practice?
No comment yet.