By Grace Crickette 
San Francisco State University Interim AVP of Business Operations

In this series, Grace Crickette provides C-Level executives a comprehensive overview of cyber insurance, while addressing business impacts and offering best practices for implementing a risk-management strategy that includes a cyber-liability policy.

Part One

Part Two

Part Three: Risk Management and Insurance Basics

Insurance and Risk Management Basics

Insurance is just one tool in the Risk Managers belt, but sometimes it is their favorite tool. Why? 

Source: securitycurrent

Security professionals have been taught the Security Triad – Confidentiality, Integrity and Availability – but there’s another triad just as critical to data protection

Category:

Information Security

Security professionals know of the Security Triad – Confidentiality, Integrity and Availability – but there’s another triad just as critical to data protection. In this article, we begin with visibility.
Source: SecureWorks

By David Sheidlower
Global Media and Advertising CISO

Is that news?  No, of course it isn’t.  In fact, deterrence (fear) may seem like an odd concept for cybersecurity. Arguably, except for highly visible physical access controls, virtually all other cybersecurity controls are designed to keep an incident from happening (i.e. protective/preventive) or detect and then respond/recover when it has. 

Source: securitycurrent