Cybersecurity incidents like ransomware can potentially bring operations to a standstill. Recent regulatory changes by the FTC and proposed changes by the SEC show that both agencies are drafting cybersecurity rules similar to ERM concepts. This would include board oversight of cybersecurity and the responsibility of senior management to implement cybersecurity policies and procedures and provide training for information security staff that is sufficient for them to address relevant security risks. In addition, this could mean that your organization may be required to report incidents and disclose cybersecurity policies and procedures.
Tune in to this ISACA Podcast episode to listen in as Cyber Defense Labs’ Manager of Cybersecurity Advisory Services Tom Schneider tells ISACA’s Jeff Champion that any threat to this essential information is an enterprise risk that needs to be managed by the enterprise through teamwork, with leadership from both the board and senior management. Tom also gives insights into managing cybersecurity risk as an enterprise risk.
To read Managing Cybersecurity Risk as Enterprise Risk, please visit: www.isaca.org/managing-cybersecurity-risk-as-enterprise-risk.
To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts.
ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech
Processes of Engagement with Scott Gould
Delivering Security Value to Product Teams Using the Power of Data
AI Ethics and the Role of IT Auditors
Using a Risk-Based Approach to Prioritize Vulnerability Remediation
The True Cost of a Data Breach
2023 IT Compliance and Risk Benchmark Report
What Kind of Glasses Are You Wearing? Your View of Risk May Be Your Biggest Risk of All
How Organizations Can Consistently Reduce Cyberrisk
Key Considerations for Conducting Remote IT Audits
Seven Things to Know Before Automating IT General Control Audits
Understanding, Assessing, Aligning and Transforming Organizational Culture
Topics in Emerging Technology, Governance and Ethics
Industry Spotlight - Julia Kanouse
What Is Your IP Address Cybersecurity IQ? The Role of IP Address Data in a Digital World
The Future of Technology Risk: 4 Ways to Build Stakeholder Trust in the Technology Risk Imperative
Measuring Security Resilience from the Lens of the Adversary Community
Risky Business – Jon Brandt
Building Digital Trust Through Advocacy
Advertising Information Security
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast