BLOG

GRC Sphere’s BreakPoint Consortium Features New Cyber Curricula

August 24, 2018
FOR IMMEDIATE RELEASE: CONTACT: Phil Wilson; Founder & Executive DirectorGRC Sphere Telephone: (978)456-8253 Email Address: [email protected] Web site address: www.GRCsphere.org GRC Sphere’s BreakPoint Consortium Features New Cyber Curricula Harvard, MA; August 23rd, 2018 — The GRC ...more

GRC Sphere Cyber Benchmarking Consortium Strengthened By Technology

August 24, 2018
 FOR IMMEDIATE RELEASE: CONTACT: Phil Wilson; Founder & Executive DirectorGRC Sphere Telephone: (978)456-8253 Email Address: [email protected] Website address: www.GRCsphere.org  GRC Sphere Cyber Benchmarking Consortium Strengthened By Technology Harvard, MA; August 23rd, 2018 ...more

GRC Sphere’s BreakPoint Program Features Cyber Methodologies

August 24, 2018
FOR IMMEDIATE RELEASE: CONTACT: Phil Wilson; Founder & Executive DirectorGRC Sphere Telephone: (978)456-8253 Email Address: [email protected] Web site address: www.GRCsphere.org   GRC Sphere’s BreakPoint Program Features Cyber Methodologies Harvard, MA; August 23rd, 2018 — The GRC ...more

GRC Sphere Cyber Consortium Announces BreakPoint Program

August 24, 2018
FOR IMMEDIATE RELEASE: CONTACT: Phil Wilson; Founder & Executive DirectorGRC Sphere Telephone: (978)456-8253 Email Address: [email protected] Website address: www.GRCsphere.org Harvard, MA; August 23rd, 2018 — The GRC Sphere (http://grcsphere.org/) a member-based Industry Benchmarking ...more

Cyber Risk is an Iceberg

February 15, 2017
We want to call your attention to Jeff Burchill's great article in CFO magazine from July 7th 2015 that has a major long-term message for us as business people, not technologists. Here's the link to this article. Jeffrey A. Burchill is senior vice president of finance and chief financial officer ...more
Category: Cybersecurity

The Business Case for Cybersecurity Insurance

June 10, 2016
I was at the zoo the other day and I saw an Australian black swan. Until I saw the swan myself, I believed all swans were white and that any sightings of black swans were anecdotal. Now I can say that not all swans are white. Before that day, no matter how many white swans I saw, I could not say ...more
Category: Cybersecurity

The Need for Heuristics in Cybersecurity

June 09, 2016
Information and cyber security professionals need a good set of heuristics.  You do not always have the luxury or the data to do a full decision analysis or risk assessment, so sometimes you have to “satisfice” as Herbert A. Simon once wrote[i].  So you need a “rule of thumb,” a mental ...more
Category: Cybersecurity

Architecture

June 09, 2016
When I teach classes on governance, I ask the class if you were just made manager of something; security, change, problem or any of the COBIT processes, and you had a “greenfield,” what would you do first in the planning[i] phase?  I get wide-ranging answers but they usually start with fix ...more
Category: Cybersecurity

Agile is Fragile

June 09, 2016
If I asked you what is the antonym of fragile, I bet you would say something like resilient unless you have read Nassim Taleb[i]. But what is fragility and what does it have to do with cybersecurity? The definition of fragile is that it is easily broken.  You will find many articles on the ...more
Category: Cybersecurity

Benchmarking Your Cybersecurity Program

June 09, 2016
You have probably heard the adage “hackers only need to get it right once, we need to get it right every time.”  Well you cannot truly expect perfection in your organization, but you can expect excellence.  You can expect your processes to be the best darn processes ...more
Category: Cybersecurity