Artwork

Innehåll tillhandahållet av Cyber Crime Junkies. Host David Mauro.. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Cyber Crime Junkies. Host David Mauro. eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

New Ways Leaders Can Assess Their Risk Appetite

55:50
 
Dela
 

Manage episode 409881928 series 3370503
Innehåll tillhandahållet av Cyber Crime Junkies. Host David Mauro.. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Cyber Crime Junkies. Host David Mauro. eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

NEW! Text Us Direct Here!

In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.

KEY TOPICS:

  • · how risk appetite effects your cyber security plans,
  • · explaining risk appetite in cyber security to leadership,
  • · how security planning involves risk appetite,
  • · new ways leaders can assess their risk appetite,
  • · how cyber insurance works,
  • · how cyber insurance is only one part of risk management,
  • · and risk management beyond cyber insurance.

Chapters

  • · 00:00 Introduction and Role Explanation
  • · 03:26 Transferring Risk and Risk Appetite
  • · 06:01 The Complexity of Insurance and Risk Management
  • · 07:41 Insurance as One Part of Risk
  • · 08:10 The Impact of Breaches Beyond Insurance
  • · 09:48 Career Journey: From Coding to Law Enforcement
  • · 16:32 Concerns of Organizational Leaders
  • · 20:22 Breakdown in Communication between Technology Leadership and the Board
  • · 21:19 Explaining Risk Mitigation and Funding Needs
  • · 22:46 Constantly Evolving Security Programs
  • · 23:02 Challenges and Techniques in Fighting Breaches
  • · 24:07 The Complexity of Cybersecurity Breaches
  • · 25:13 The Priming Process and Research Involved in Breaches
  • · 26:07 Measuring and Quantifying Risk in Cybersecurity
  • · 27:03 Compliance vs. Cybersecurity
  • · 28:03 The Importance of Cyber Risk Quantification
  • · 29:11 The Role of Compliance and Security in the Financial Industry
  • · 30:02 Preparing for a Data Breach: Incident Response Planning
  • · 34:

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Click the link above or text 904-867-4468, 2014652: and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.

Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.


  continue reading

191 episoder

Artwork
iconDela
 
Manage episode 409881928 series 3370503
Innehåll tillhandahållet av Cyber Crime Junkies. Host David Mauro.. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Cyber Crime Junkies. Host David Mauro. eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

NEW! Text Us Direct Here!

In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.

KEY TOPICS:

  • · how risk appetite effects your cyber security plans,
  • · explaining risk appetite in cyber security to leadership,
  • · how security planning involves risk appetite,
  • · new ways leaders can assess their risk appetite,
  • · how cyber insurance works,
  • · how cyber insurance is only one part of risk management,
  • · and risk management beyond cyber insurance.

Chapters

  • · 00:00 Introduction and Role Explanation
  • · 03:26 Transferring Risk and Risk Appetite
  • · 06:01 The Complexity of Insurance and Risk Management
  • · 07:41 Insurance as One Part of Risk
  • · 08:10 The Impact of Breaches Beyond Insurance
  • · 09:48 Career Journey: From Coding to Law Enforcement
  • · 16:32 Concerns of Organizational Leaders
  • · 20:22 Breakdown in Communication between Technology Leadership and the Board
  • · 21:19 Explaining Risk Mitigation and Funding Needs
  • · 22:46 Constantly Evolving Security Programs
  • · 23:02 Challenges and Techniques in Fighting Breaches
  • · 24:07 The Complexity of Cybersecurity Breaches
  • · 25:13 The Priming Process and Research Involved in Breaches
  • · 26:07 Measuring and Quantifying Risk in Cybersecurity
  • · 27:03 Compliance vs. Cybersecurity
  • · 28:03 The Importance of Cyber Risk Quantification
  • · 29:11 The Role of Compliance and Security in the Financial Industry
  • · 30:02 Preparing for a Data Breach: Incident Response Planning
  • · 34:

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Click the link above or text 904-867-4468, 2014652: and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.

Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.


  continue reading

191 episoder

כל הפרקים

×
 
Loading …

Välkommen till Player FM

Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.

 

Snabbguide