Defining a Cyber-Risk Appetite That Works
Jack Jones, Chairman, FAIR Institute
Many organizations have defined a risk appetite; however very few of these definitions are actually useful. For the most part they boil down to nothing more specific than “medium-low” and they rarely play a meaningful role in decision-making. In this session, Jack Jones will share a simple process for defining an unambiguous cyber-risk appetite that can drive better decision-making.Learning Objectives:1: Recognize the limitations of common risk appetite definitions.2: Understand the various value propositions that come from a clearly defined risk appetite.3: Learn how to apply the principles and methods shared to define a risk appetite that works.Pre-Requisites:Attendees should understand the principles and intent of risk appetite definitions, KRIs, KPIs and risk measurement.
Видео Defining a Cyber-Risk Appetite That Works канала RSA Conference
Many organizations have defined a risk appetite; however very few of these definitions are actually useful. For the most part they boil down to nothing more specific than “medium-low” and they rarely play a meaningful role in decision-making. In this session, Jack Jones will share a simple process for defining an unambiguous cyber-risk appetite that can drive better decision-making.Learning Objectives:1: Recognize the limitations of common risk appetite definitions.2: Understand the various value propositions that come from a clearly defined risk appetite.3: Learn how to apply the principles and methods shared to define a risk appetite that works.Pre-Requisites:Attendees should understand the principles and intent of risk appetite definitions, KRIs, KPIs and risk measurement.
Видео Defining a Cyber-Risk Appetite That Works канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
What Makes a Good KRI? Using FAIR to Discover Meaningful MetricsSATARLA TRAINING Risk Appetite, Tolerance and CriteriaDeveloping Key Performance Indicators for SecurityUnderstanding risk appetiteHow VPN really works? Understand Virtual private network in 5 mins (2022)Risk Appetite and Risk ToleranceMaritime cyber security – what you need to knowWhat is Risk Mitigation?Risk and How to use a Risk MatrixHow To Measure Anything in Cybersecurity RiskHow to Plan for and Implement a Cybersecurity StrategyWhat does your Board of Directors Want Around Risk Management?What is your organisation's risk appetite? - Risk ManagementNIST Cybersecurity Framework Implementation StepsExamples of Risk Appetite and relating KRIsVirtual Session: NIST Cybersecurity Framework ExplainedA case study master class on Reporting Cyber Risk to the Board by Omar KhwajaWhat Is Risk Profiling? How Can You Understand Your Own Risk Profile? | DSP Mutual FundCyber Security Navigating Towards IMO 2021 and Beyond