Artwork

Contenuto fornito da Cyber Crime Junkies-David Mauro. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Cyber Crime Junkies-David Mauro o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

New Ways Leaders Can Assess Their Risk Appetite

55:50
 
Condividi
 

Manage episode 410001846 series 3559123
Contenuto fornito da Cyber Crime Junkies-David Mauro. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Cyber Crime Junkies-David Mauro o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

NEW! Text Us Direct Here!

In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.

KEY TOPICS:

  • · how risk appetite effects your cyber security plans,
  • · explaining risk appetite in cyber security to leadership,
  • · how security planning involves risk appetite,
  • · new ways leaders can assess their risk appetite,
  • · how cyber insurance works,
  • · how cyber insurance is only one part of risk management,
  • · and risk management beyond cyber insurance.

Chapters

  • · 00:00 Introduction and Role Explanation
  • · 03:26 Transferring Risk and Risk Appetite
  • · 06:01 The Complexity of Insurance and Risk Management
  • · 07:41 Insurance as One Part of Risk
  • · 08:10 The Impact of Breaches Beyond Insurance
  • · 09:48 Career Journey: From Coding to Law Enforcement
  • · 16:32 Concerns of Organizational Leaders
  • · 20:22 Breakdown in Communication between Technology Leadership and the Board
  • · 21:19 Explaining Risk Mitigation and Funding Needs
  • · 22:46 Constantly Evolving Security Programs
  • · 23:02 Challenges and Techniques in Fighting Breaches
  • · 24:07 The Complexity of Cybersecurity Breaches
  • · 25:13 The Priming Process and Research Involved in Breaches
  • · 26:07 Measuring and Quantifying Risk in Cybersecurity
  • · 27:03 Compliance vs. Cybersecurity
  • · 28:03 The Importance of Cyber Risk Quantification
  • · 29:11 The Role of Compliance and Security in the Financial Industry
  • · 30:02 Preparing for a Data Breach: Incident Response Planning
  • · 34:

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Click the link above or text 904-867-4468, 2014652: and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.

Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.


  continue reading

187 episodi

Artwork
iconCondividi
 
Manage episode 410001846 series 3559123
Contenuto fornito da Cyber Crime Junkies-David Mauro. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Cyber Crime Junkies-David Mauro o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

NEW! Text Us Direct Here!

In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.

KEY TOPICS:

  • · how risk appetite effects your cyber security plans,
  • · explaining risk appetite in cyber security to leadership,
  • · how security planning involves risk appetite,
  • · new ways leaders can assess their risk appetite,
  • · how cyber insurance works,
  • · how cyber insurance is only one part of risk management,
  • · and risk management beyond cyber insurance.

Chapters

  • · 00:00 Introduction and Role Explanation
  • · 03:26 Transferring Risk and Risk Appetite
  • · 06:01 The Complexity of Insurance and Risk Management
  • · 07:41 Insurance as One Part of Risk
  • · 08:10 The Impact of Breaches Beyond Insurance
  • · 09:48 Career Journey: From Coding to Law Enforcement
  • · 16:32 Concerns of Organizational Leaders
  • · 20:22 Breakdown in Communication between Technology Leadership and the Board
  • · 21:19 Explaining Risk Mitigation and Funding Needs
  • · 22:46 Constantly Evolving Security Programs
  • · 23:02 Challenges and Techniques in Fighting Breaches
  • · 24:07 The Complexity of Cybersecurity Breaches
  • · 25:13 The Priming Process and Research Involved in Breaches
  • · 26:07 Measuring and Quantifying Risk in Cybersecurity
  • · 27:03 Compliance vs. Cybersecurity
  • · 28:03 The Importance of Cyber Risk Quantification
  • · 29:11 The Role of Compliance and Security in the Financial Industry
  • · 30:02 Preparing for a Data Breach: Incident Response Planning
  • · 34:

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Click the link above or text 904-867-4468, 2014652: and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.

Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.


  continue reading

187 episodi

Tutti gli episodi

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida