Cyber Risk Collaborative - A CRA Resource
Cyber Risk Collaborative - A CRA Resource
  • 37
  • 13 120
Choppy Waters: Navigating Increased Scrutiny and Legal Liability for CISOs
As cyber incidents escalate in number and severity, so do the stakes for CISOs, who must navigate the pressures of arguing for resourcing, implementing robust cybersecurity security measures, as well as managing the aftermath of breaches. That role now comes with increased regulatory scrutiny, and potential personal civil and criminal liability.
This presentation will provide guidance for CISOs to better safeguard themselves while enhancing the organization's overall cybersecurity posture. Join us to gain insights into navigating the increased scrutiny and legal liability that define the modern CISO's role.
zhlédnutí: 39

Video

The SEC Cybersecurity Regulation and CISO Liability
zhlédnutí 113Před 6 měsíci
The recently enacted SEC Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure Rule now requires publicly traded companies to disclose information about cybersecurity programs on their annual, 10-K report. Additionally, public companies must disclose information about all material or potentially material cybersecurity incidents in 8-K reports. These new requirements, alon...
ISO ISO 27001:2022 Certification: What You Need to Know
zhlédnutí 171Před 9 měsíci
This briefing is for organizations considering certifying to ISO 27001:2022 those planning to certify to ISO 27001 for the first time and those already certified to ISO 27001:2013. Discussion topics include: (1) a review of the ISO 27001:2013 Standard, including Management Clauses, and Annex A controls; (2) differences between the ISO 27001:2013 and ISO 27001:2022 standards; (3) required ISO 27...
A CISO’s Guide to Harnessing the Power and Managing the Risks of Artificial Intelligence (AI)
zhlédnutí 241Před 10 měsíci
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for helping their organizations securely implement AI solutions, like ChatGPT. Discussion topics include: (1) CISO guidance for supporting the demand for rapid AI adoption; (2) navigating the AI landscape; (3) implementing effective AI governance structures and p...
A CISO’s Guide to Effective Vulnerability Management
zhlédnutí 256Před 11 měsíci
This briefing was based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics discussed include: (1) managing vulnerabilities on premises, in the Cloud, and in third-party environments; (2) identification, classification, prioritization, and remediation best practices; (3...
Effective Cybersecurity Policies for AI and Emerging Technologies
zhlédnutí 214Před rokem
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective cybersecurity policies that address the security challenges of AI and other emerging technologies. Topics discussed include: (1) policies frameworks; (2) administration (updates, approvals); (3) communication (e.g., to employees, contract...
Security Metrics in the Boardroom and in the Backroom
zhlédnutí 475Před rokem
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing boardroom metrics and KPI metrics to support their cybersecurity programs. Topics discussed will include: (1) designing and implementing a metrics program using the Cybersecurity Collaborative (CSC) Metrics Three-Tiered Framework (operational metri...
A CISO’s Guide to Effective Risk Assessments
zhlédnutí 763Před rokem
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing and conducting risk assessments to meet compliance requirements and to promote a “risk culture” throughout their organizations. Topics discussed will include: (1) guidance for maturing your risk management program from “good” to “better” to “best”;...
CISO Developed Tools: A Review of 5 Tools Built by CISOs
zhlédnutí 583Před rokem
Collaboration has become a vital strategy for CISOs to help implement effective security practices, tools, and technologies. Through the confidential sharing of experiences, best practices, policies, and tools, the Cybersecurity Collaborative continues to be an important strategic resource for CISOs and their staffs. During this briefing, speakers will discuss the key challenges facing today’s ...
A CISO’s Guide to an Effective Cybersecurity Metrics Program
zhlédnutí 3,7KPřed rokem
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing and using security metrics to drive decisions within their organizations. Topics discussed include: (1) defining security metrics; (2) identifying criteria for an effective security metric; (3) adopting a metrics framework; (4) methods for metrics ...
A CISO’s Guide to Developing an Effective Application Security Program
zhlédnutí 728Před rokem
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for addressing security within their applications development organizations. While NIST, OWASP, PCI-DSS, and other industry standards provide great guidance for security within the SDLC, newly evolving development platforms and methodologies and delivery pressure...
Why CISOs Trust CyberRisk Alliance
zhlédnutí 1,3KPřed 2 lety
With over 1000 CISOs across various industries, CyberRisk Alliance's CISO Communities are a one stop shop for executive collaboration. With Peer to Peer Networking, Idea Sharing and Validation CRA is here to support both the new and seasoned Cybersecurity executive and their teams. The CISO communities accomplish the goal of supporting security teams and national security through in person dinn...
Best Practices for Effective Incident Management
zhlédnutí 411Před 2 lety
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared details of their incident management best practices, including incident response plans, playbooks, and metrics. The Best Practices Guide presents a framework and components for the incident management program, such as executive support, resources, stakeholder engagement, documented requirements and...
A CISO Developed Practical Guide to the Boardroom
zhlédnutí 767Před 2 lety
This briefing is based on the discussion of experiences and practices of a cross-sector task force of CISOs. Practical guidance is provided to CISOs who are new to their roles or their companies. Guidance centers on answers to questions relating to the following topics: (1) boardroom responsibilities and authority; (2) what board members want to know about the company’s security posture; (3) ho...
A CISO’s Guide to Effective Security Awareness Education and Training
zhlédnutí 279Před 2 lety
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared details of their security awareness programs and developed best practice recommendations for improving program effectiveness. Security awareness education has always been a key component of a comprehensive cybersecurity program. In recent years, phishing emails leading to ransomware breaches have u...
A CISO Developed Third & Fourth Party Incident Response Guide and Toolkit
zhlédnutí 106Před 2 lety
A CISO Developed Third & Fourth Party Incident Response Guide and Toolkit
CISO Developed DevSecOps Supply Chain Best Practices
zhlédnutí 126Před 2 lety
CISO Developed DevSecOps Supply Chain Best Practices
A CISO Developed Ransomware Threat Guide and Toolkit
zhlédnutí 165Před 2 lety
A CISO Developed Ransomware Threat Guide and Toolkit
A CISO Developed Cloud Migration Implementation Guide and Toolkit
zhlédnutí 172Před 2 lety
A CISO Developed Cloud Migration Implementation Guide and Toolkit
A CISO Developed Asset Management Implementation Guide
zhlédnutí 201Před 2 lety
A CISO Developed Asset Management Implementation Guide
Customizing End User Cybersecurity Education for Your Community and Culture
zhlédnutí 134Před 2 lety
Customizing End User Cybersecurity Education for Your Community and Culture
NACo Cybersecurity Guidance for Local Government - NACo CIO & NIST Fellow
zhlédnutí 158Před 3 lety
NACo Cybersecurity Guidance for Local Government - NACo CIO & NIST Fellow
Third Party Risk Management Toolkit - CISO American Family Insurance (S. Cuffie)
zhlédnutí 162Před 3 lety
Third Party Risk Management Toolkit - CISO American Family Insurance (S. Cuffie)
A Whole of Nation Response to Ransomware - CISO and CIO Perspectives
zhlédnutí 68Před 3 lety
A Whole of Nation Response to Ransomware - CISO and CIO Perspectives
Reducing Third Party Cyber Risk in Local Government
zhlédnutí 111Před 3 lety
Reducing Third Party Cyber Risk in Local Government
A CISO Developed Third Party Risk Management Framework
zhlédnutí 175Před 3 lety
A CISO Developed Third Party Risk Management Framework
NACo Cybersecurity Collaborative: A Cybersecurity Resource for Wisconsin Counties
zhlédnutí 27Před 3 lety
NACo Cybersecurity Collaborative: A Cybersecurity Resource for Wisconsin Counties
Leadership Profile: Dawn Cappelli
zhlédnutí 48Před 3 lety
Leadership Profile: Dawn Cappelli
How cybersecurity and HR leaders can hire and retain a diverse workforce
zhlédnutí 142Před 3 lety
How cybersecurity and HR leaders can hire and retain a diverse workforce
Cyber Risk Insurance: The Challenges, the Value and the Reality
zhlédnutí 135Před 3 lety
Cyber Risk Insurance: The Challenges, the Value and the Reality

Komentáře

  • @ritemoni7956
    @ritemoni7956 Před 9 měsíci

    Beneficial information. thanks for sharing with us ❤😍

  • @davydo7566
    @davydo7566 Před rokem

    this is gr8 but y'all should please drop the pdf or a link that was referred to during the course of the video

  • @hottroddinn
    @hottroddinn Před rokem

    Under-rated video which doesn't come up enough. Thanks to everyone who contributed and showing how it's done in different organizations!

  • @roxannegraham
    @roxannegraham Před rokem

    ✅ *promo sm*

  • @kingfifisaxon
    @kingfifisaxon Před rokem

    Excellent content and well discussed to bring clarity to board and management’s’ obligations on cybersecurity.

  • @dennismatthew853
    @dennismatthew853 Před rokem

    ρгό𝔪σŞm 🌈

  • @swazipond
    @swazipond Před 2 lety

    I love everything about this video! One, it is beautifully filmed, which I appreciate. But mostly the energy and collaboration in the room is magnetic!

  • @JoePanettieri
    @JoePanettieri Před 2 lety

    Great to see the energy and interaction. -jp

  • @chcgo123jock
    @chcgo123jock Před 2 lety

    Putting CISOs back at the center of community building!

  • @deanbryant572
    @deanbryant572 Před 3 lety

    Nice one! Glad I found your videos. Look into using smzeus . c o m. It will help you get your videos into the suggested feed and rank better in the search.

  • @michaeljearfed5913
    @michaeljearfed5913 Před 4 lety

    Cool m8

  • @nikklasnachton5865
    @nikklasnachton5865 Před 4 lety

    Cool I love it really so much you are so amazing