Blog Archives

Cybersecurity and the Board

6 Concepts That Help Boards Oversee Cybersecurity

by | Feb 8, 2016 | for Cybergovernance Journal – Cybernance

The U.S. Department of Homeland Security’s (DHS) top privacy official said today that a “clear mandate” from top management is the foundation of an organization’s ability to establish and implement an effective data security and privacy plan.

Read more ›

Posted in Compliance, cybergovernance, Cybersecurity, Governance, Legal, Regulatory, Risk Management
Tags: , , , , , ,

Cybernance – First in Cybergovernance

Read more ›

Posted in Compliance, Content, Cyber-Insurance, cybergovernance, Cybersecurity, Governance, Governent Oversight
Tags: , , , , , , , ,

Information Management – 2016

Five 2016 Information Management Predictions

| Wednesday, January 13th, 2016 | recall

If it seems as though information management has grown exponentially over the past year, it has. And 2016 will continue to usher in even more growth for the industry.

Read more ›

Posted in Compliance, cybergovernance, Governance, Incident Response, Regulatory, Risk Management
Tags: , , , ,

Strong Document Policies Combat Data Theft

In Era of Data Breaches, Businesses Need Strong Document Policies
Mark Pribish, Special to The Republic 6:52 p.m. MST January 28, 2016

As a consumer, I think about how my information may still reside with a tax preparer or doctor that I have not done business with in 10 years,

Read more ›

Posted in Breach, Compliance, cybergovernance, Cybersecurity, Fraud, Fraud, Governance, ID Theft, Malware, Risk Management
Tags: , , , , , ,

2016: The Year of Cybergovernance

2016 Is The Year of Cybergovernance: How Directors Can Protect Themselves and Their Companies

by | Jan 25, 2016 | Cybernance – First in Cybergovernance

Beijing is accelerating the Chinese economy by short-circuiting the time and cost of innovation.

Read more ›

Posted in Breach, Cyberattack, cybergovernance, Data Security, Governance, Hacks, Incident Response, Legal, Risk Management
Tags: , , , , , , , ,

Redefining the Cybersecurity Attack Surface – Part 3

Redefining the Cybersecurity Attack Surface Part 3: Managing Complexity

by | Jan 18, 2016

This is the last part of a 3-piece series on the concept of “attack surface”. Part 1 argued that an organization’s exposure to cyber risk – traditionally calculated as a tally of the technologies that house and traffic data – also includes the people who touch all those technologies.

Read more ›

Posted in attack surface, Breach, Cyberattack, cybergovernance, Cybersecurity, Governance, Hacks
Tags: , , , , , ,

Cybersecurity Attack Surface – Part 1

Redefining The Cybersecurity Attack Surface, Part 1

by | Jan 4, 2016 | CYBERGOVERNANCE Journal

When discussing an organization’s security posture, “attack surface” is the common term used to describe the aggregate vulnerabilities that the firm exhibits.

Read more ›

Posted in cybergovernance, Cybersecurity, Fraud, Governance, Hacks, ID Theft, Malware, Malware & Other Threats, Phishing, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , ,

Universal Model of Cyber Risk – Part 3

A Universal Model for Assessing Cyber Risk Part 3: Obstacles to Effective Regulation

by | Dec 21, 2015 | for Cybergovernance Journal

Part 1 examined how the increasing incidence of cyber breaches is bringing significant pressure on corporate directors to assume more oversight of cyber risk In part 2 we contrasted the rise of cybergovernance (cybersecurity governance) with the history of financial governance following the passage of the Sarbanes-Oxley Act.

Read more ›

Posted in Breach, cybergovernance, Cybersecurity, Data Security, Governance, Risk Management
Tags: , , ,

Cybergovernance – The Key to Cybersecurity

Needed: A Shared Cybergovernance Model

My own theory is that we are in the middle of a dramatic and broad technological and economic shift in which software companies are poised to take over large swathes of the economy.

Read more ›

Posted in Content, cybergovernance, Cybersecurity, Governance, Incident Response, Layered Defense, Risk Management
Tags: , , , ,

Universal Model of Cyber Risk – Part 1

A Universal Model for Assessing Cyber Risk Part 1: More Than a Technology Problem

by | Dec 7, 2015 | for Cybergovernance Journal

This is the first post in a four-part discussion of the need for a universal model for assessing cyber risk.

Read more ›

Posted in Compliance, cybergovernance, Cybersecurity, Governance, Risk Management
Tags: , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: