CISOs need to report the key security performance and risk indicators to executive teams in way that they find meaningful and actionable. A core pillar of a maturecyber risk program is the ability to ...
Measuring a supplier’s adherence to contractual service levels is at the core of supplier performance management. Yet, while every organization tracks key performance indicators (KPIs) on some level, ...
Risk management systems are increasingly implemented by drinking water utilities to prevent contamination events. While some Canadian provinces have mandated these systems, evaluating their success ...
With the US Securities and Exchange Commission requiring CISOs and boards of directors to increase the level of transparency around their organizations' cybersecurity capabilities and to speed up ...
Holistic risk assessment is a multifaceted approach that seeks to understand, evaluate and manage risk across an organization. It involves creation of a vision-driven risk appetite framework for ...
First coined by Bruce Schneier in his book Beyond Fear, the term "security theater" has entered the everyday lexicon to describe something that projects a facade of security without substantively ...
Risk management should not just be a checklist to be compliant. Rather, it should be a source of value, inextricably tied to your business strategy. Purpose-driven and customer-centric risk management ...
No data and analytics leader would appreciate being told that they’re asleep at the wheel. Indeed, most of their waking hours are spent leading data, analytics and artificial intelligence (AI) teams ...
Our eLibrary offers over 25,000 IMF publications in multiple formats. Since 2015, the Central Bank of Sri Lanka (CBSL) has enhanced its risk management through a comprehensive framework and is aiming ...