New perspectives on how cyber risk can power performance


New perspectives on how cyber risk can power performance

Businesses leaders are rightly concerned about the frequent media reports of cyberattacks, data breaches, and other cyberthreats. At the same time, they understand that doing what it takes to create enterprise value often means taking risks because risk powers performance.

This collection of five articles offers insight into how understanding and embracing cyber risk is essential to innovation, performance improvement, and enterprise growth.

A world beyond passwords: Improving security, efficiency, and user experience in digital transformation

There’s a reason why so many of us use the same simple password for every login: Who can remember dozens of different combinations of numbers and letters? The good news is that technology is on the verge of rendering passwords obsolete, bolstering security as well as making users and customers happier.

The new CISO: Leading the strategic security organization
As customer data and intellectual property evolve and invite new forms of information theft, the leadership role of the chief information security officer must become stronger and more strategic—moving beyond the role of compliance monitor to help create an organizational culture of shared cyber risk ownership.

Quantifying risk: What can cyber risk management learn from the financial services industry?
Quantitative models to measure cyber risk—the same kinds of models widely used by financial services firms—are starting to gain broader acceptance. But risk managers may be led astray if they rely too much on models out of context. What lessons in effectively using models does the financial services industry hold for cyber risk management?

The hidden costs of an IP breach: Cyber theft and the loss of intellectual property
Losing customer data to hackers can be costly and embarrassing, but losing intellectual property to cyber thieves could threaten a company’s future. The first step toward prioritizing IP protection and incident readiness: properly valuing possible IP losses.

From security monitoring to cyber risk monitoring: Enabling business-aligned cybersecurity
No IT system can catch every phishing email and data breach. But what happens when a virus infects your network? Executives from the C-suite down need to better understand today’s cyber risks, emphasizing careful monitoring and quick response plans—and, yes, prevention.

Download the publication
Did you find this useful?