by Bob Chaput | Apr 26, 2024 | Attacks, Threats, New Technology and Increasing Attack Surface, Blog Educational Series - Stop the Cyber Bleeding | Putting ECRM into Action, Costs of Cyber Attacks and Data Breaches, Patient Harm, Patient Safety
Navigating Cyber Risks in Healthcare: A Critical Wake-Up Call“Plus ça change, plus c’est la même chose” (“The more things change, the more they stay the same.”)–Jean-Baptiste Alphonse KarrIn our digital age, the healthcare sector remains the most...
by Bob Chaput | Apr 25, 2024 | Blog Educational Series - Stop the Cyber Bleeding | Putting ECRM into Action, Board and CISO Interaction – Best Practices, Governance, Strategy, and Alignment
From Cyber Guardian to Boardroom Luminary – Top 5 Actions“The best time to plant a tree was 20 years ago. The second best time is now.” – Chinese ProverbIn my recent post, From Cyber Guardian to Boardroom Luminary- Yogi Berra, I presented a case for change in...
by Bob Chaput | Mar 5, 2024 | Blog Educational Series - Stop the Cyber Bleeding | Putting ECRM into Action, Board and CISO Interaction – Best Practices, Governance, Strategy, and Alignment
From Cyber Guardian to Boardroom Luminary – Yogi BerraIt’s like deja-vu, all over again.—Yogi Berra[1]IntroductionI recently delivered the keynote at an ISC2 Spotlight event focused on Governance, Risk Management, and Compliance (GRC). The title of my talk...
by Bob Chaput | Feb 19, 2024 | Blog Series - Overseeing the Development of Your ECRM Framework and Strategy, Governance, Strategy, and Alignment
Cyber Risk Literacy – 4 – ECRM Program vs. Cybersecurity StrategyBy failing to prepare, you are preparing to fail.—Benjamin Franklin[1]First, in case you didn’t notice, I have changed the series title from “Cyber Risk Illiteracy” to “Cyber Risk Literacy.” After all,...
by Bob Chaput | Feb 15, 2024 | Blog Series - Overseeing the Development of Your ECRM Framework and Strategy, Governance, Strategy, and Alignment
Cyber Risk Illiteracy – 3 – ECRM? ERM?A definition is the enclosing a wilderness of idea within a wall of words.—Samuel Butler[1]Oh, man! Do we ever need to enclose the wilderness of enterprise cyber risk management and cybersecurity ideas within a wall of words?!?...