Artwork

İçerik Cyber Crime Junkies-David Mauro tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Cyber Crime Junkies-David Mauro veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Player FM - Podcast Uygulaması
Player FM uygulamasıyla çevrimdışı Player FM !

New Ways Leaders Can Assess Their Risk Appetite

55:50
 
Paylaş
 

Manage episode 410001846 series 3559123
İçerik Cyber Crime Junkies-David Mauro tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Cyber Crime Junkies-David Mauro veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

NEW! Text Us Direct Here!

In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.

KEY TOPICS:

  • · how risk appetite effects your cyber security plans,
  • · explaining risk appetite in cyber security to leadership,
  • · how security planning involves risk appetite,
  • · new ways leaders can assess their risk appetite,
  • · how cyber insurance works,
  • · how cyber insurance is only one part of risk management,
  • · and risk management beyond cyber insurance.

Chapters

  • · 00:00 Introduction and Role Explanation
  • · 03:26 Transferring Risk and Risk Appetite
  • · 06:01 The Complexity of Insurance and Risk Management
  • · 07:41 Insurance as One Part of Risk
  • · 08:10 The Impact of Breaches Beyond Insurance
  • · 09:48 Career Journey: From Coding to Law Enforcement
  • · 16:32 Concerns of Organizational Leaders
  • · 20:22 Breakdown in Communication between Technology Leadership and the Board
  • · 21:19 Explaining Risk Mitigation and Funding Needs
  • · 22:46 Constantly Evolving Security Programs
  • · 23:02 Challenges and Techniques in Fighting Breaches
  • · 24:07 The Complexity of Cybersecurity Breaches
  • · 25:13 The Priming Process and Research Involved in Breaches
  • · 26:07 Measuring and Quantifying Risk in Cybersecurity
  • · 27:03 Compliance vs. Cybersecurity
  • · 28:03 The Importance of Cyber Risk Quantification
  • · 29:11 The Role of Compliance and Security in the Financial Industry
  • · 30:02 Preparing for a Data Breach: Incident Response Planning
  • · 34:

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Click the link above or text 904-867-4468, 2014652: and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.

Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.


  continue reading

188 bölüm

Artwork
iconPaylaş
 
Manage episode 410001846 series 3559123
İçerik Cyber Crime Junkies-David Mauro tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Cyber Crime Junkies-David Mauro veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

NEW! Text Us Direct Here!

In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.

KEY TOPICS:

  • · how risk appetite effects your cyber security plans,
  • · explaining risk appetite in cyber security to leadership,
  • · how security planning involves risk appetite,
  • · new ways leaders can assess their risk appetite,
  • · how cyber insurance works,
  • · how cyber insurance is only one part of risk management,
  • · and risk management beyond cyber insurance.

Chapters

  • · 00:00 Introduction and Role Explanation
  • · 03:26 Transferring Risk and Risk Appetite
  • · 06:01 The Complexity of Insurance and Risk Management
  • · 07:41 Insurance as One Part of Risk
  • · 08:10 The Impact of Breaches Beyond Insurance
  • · 09:48 Career Journey: From Coding to Law Enforcement
  • · 16:32 Concerns of Organizational Leaders
  • · 20:22 Breakdown in Communication between Technology Leadership and the Board
  • · 21:19 Explaining Risk Mitigation and Funding Needs
  • · 22:46 Constantly Evolving Security Programs
  • · 23:02 Challenges and Techniques in Fighting Breaches
  • · 24:07 The Complexity of Cybersecurity Breaches
  • · 25:13 The Priming Process and Research Involved in Breaches
  • · 26:07 Measuring and Quantifying Risk in Cybersecurity
  • · 27:03 Compliance vs. Cybersecurity
  • · 28:03 The Importance of Cyber Risk Quantification
  • · 29:11 The Role of Compliance and Security in the Financial Industry
  • · 30:02 Preparing for a Data Breach: Incident Response Planning
  • · 34:

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Click the link above or text 904-867-4468, 2014652: and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.

Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.


  continue reading

188 bölüm

Tüm bölümler

×
 
Loading …

Player FM'e Hoş Geldiniz!

Player FM şu anda sizin için internetteki yüksek kalitedeki podcast'leri arıyor. En iyi podcast uygulaması ve Android, iPhone ve internet üzerinde çalışıyor. Aboneliklerinizi cihazlar arasında eş zamanlamak için üye olun.

 

Hızlı referans rehberi