Many organizations know they must have the basics: hire a CISO, perform a risk assessment, and find security vendors to fill up the holes. Unfortunately, these are often mere boxes to check. Impact Makers’ former CISO Cathie Brown offers a few simple considerations in each of those steps that will strengthen your cybersecurity posture, like what to look for in a robust risk assessment and a trustworthy security vendor.
Values are proven when demonstrated without a mandate to do so.
You won’t find a financial services institution that does not have a theme of customer, fairness or integrity woven into its core values. The current industry deregulation trend is a powerful opportunity for financial services firms to show and prove their values, and that they exist to benefit a variety of stakeholders, not just shareholders.
Organizational risk management is too often treated as a compliance issue with complex rules that result in a back office tracking of risks that don’t see the light of day. This presentation contrasts a traditional view of organizational risk management with an alternative view provided in a Harvard Business Review article by Robert S. Kaplan and Anette Mikes. This categorization of risk allows executives to understand the qualitative distinctions between the types of risks that organizations face.
Enhancing cybersecurity is critical, but there is a pervasive Band-Aid mindset causing organizations to commonly overlook the vital ingredient to any amount of successful security: culture change. Need a reminder why cybersecurity is at the top of so many lists? According
While most organizations have made some investments in each of the three building blocks of cybersecurity, many overemphasize “technology.” The most overlooked component are the “people,” which will actually make or break the effectiveness of your cybersecurity.
What is your reaction when you hear about a hack? Maybe “hacker” elicits thoughts of a sinister group of computer experts in a fortified basement committing acts of espionage and cyberwarfare. Hacking is frequently associated with illegally gaining access to critical personal, organizational, or government information. Oh yes, and of course, dark hoodies. It’s obviously very cold in the basement.
Data is something everyone uses and needs to do their job. When people don’t trust their data, organizations have a big problem on their hands and it won’t go away overnight.
The only way to fix a lack of trust is to build trust. Getting employees to buy in to a new way of using data is a process of building trust. Just taking the spreadsheets away won’t work. People are more dedicated to their culture than any strategy.
I was sitting around a table last Sunday having lunch, settling my golf bets with some friends from the day’s round. While we don’t play for much, the betting is secondary to the true prize of bragging rights. Nevertheless, as is custom with our friend group, all bets must be settled right after the round.
Amazon Web Services (AWS) published a case study on Impact Makers’ project with MedStar Health. Impact Makers used AWS to support a new digital presence for MedStar. The collaboration with AWS provides a state-of-the-art platform that is highly secure, scalable and cost-effective.