Companies Home Search Profile

Measuring and Managing Top Cyber Risks

Focused View

Kip Boyle

1:39:03

103 View
  • 01 - Protect against cyberattacks.mp4
    00:55
  • 02 - What you should know.mp4
    01:18
  • 03 - Cybersecurity overview.mp4
    01:56
  • 01 - Plan to measure cyber risks.mp4
    04:26
  • 02 - Data-driven cyber risk management.mp4
    03:32
  • 03 - Understand the 010 scale.mp4
    03:30
  • 04 - Set target scores for each control.mp4
    02:54
  • 05 - Decide where to measure information risk.mp4
    05:33
  • 06 - Create a score key for experts.mp4
    02:47
  • 07 - Prepare to collect scores from experts.mp4
    04:31
  • 08 - Score collection workflow.mp4
    05:49
  • 09 - Collect scores from your systems.mp4
    02:17
  • 10 - Challenge Discover themes.mp4
    02:43
  • 11 - Solution Discover themes.mp4
    02:53
  • 01 - The questions that drive you.mp4
    01:46
  • 02 - Determine resilience.mp4
    02:13
  • 03 - Determine the top five risks.mp4
    02:16
  • 04 - Understand the leadership landscape.mp4
    05:05
  • 05 - Challenge Evaluate std.dev.mp4
    01:18
  • 06 - Solution Evaluate std.dev.mp4
    03:01
  • 01 - Generate ideas to manage top risks.mp4
    04:00
  • 02 - Estimate costs.mp4
    03:07
  • 03 - Estimate benefits.mp4
    04:39
  • 04 - Prepare proposals.mp4
    03:24
  • 05 - Challenge Prioritize implementations.mp4
    01:28
  • 06 - Solution Prioritize implementations.mp4
    01:33
  • 01 - Communicate with executives.mp4
    03:31
  • 02 - Communicate with stakeholders.mp4
    03:18
  • 03 - Communicate with auditors.mp4
    03:33
  • 01 - Determine measurement frequency.mp4
    02:09
  • 02 - Build on baseline measurements.mp4
    01:26
  • 03 - Construct an annual program of work.mp4
    05:26
  • 01 - Next steps with top cyber risks.mp4
    00:46
  • Description


    Finding your organization’s top cyber risks isn’t easy, especially because cyber has become a full-fledged business risk—sometimes eclipsing risks to sales, order fulfillment, and accounts receivable. In this course, the second in a two-part series, Kip Boyle explains how to pinpoint these threats and illustrate the business value of your cybersecurity program’s work to senior decision-makers.

    Discover how to identify risks in a way that strengthens your cybersecurity culture, mitigate cyber risks while creating lots of business value, and report your progress to executives, auditors, and other stakeholders. To learn more about how to build a program that supports this work, check out the first course in this series, Building and Managing a Cybersecurity Program.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    I’ve been working in cybersecurity since 1992. I started as an air force officer, leading information technology teams. My assignments had us handling very sensitive information related to air-to-air weapons testing, so we were expected to practice what I now call “good cyber hygiene”. My most challenging job during this time was director of wide area network security for the F-22 “Raptor”. At the time, we were getting ready for the first production jets to come down the assembly line. It was very exciting! After the USAF, as a project leader at Stanford Research (SRI), I helped many Fortune 100 firms grapple with cybersecurity on a large scale. The problems they were dealing with were often 5 years or more ahead of the mainstream. So, there were no “off-the-shelf” solutions and many of our customers didn’t even know where to start. With no one else to turn to, they would come to us. Fast forward a few years and I was selected to be Chief Information Security Officer (CISO) of an insurance company. They owned a few subsidiaries, so I was also providing cybersecurity leadership to senior decision-makers of a community bank, credit union, debit/credit card transaction processor, and an IT managed service provider. I learned a lot about the business value of cybersecurity during those years. Then, in June of 2015, I launched my own company, Cyber Risk Opportunities. These days, cyberattacks are hurting businesses, even bankrupting them. That's wrong! We help executives manage cyber as the business risk it has become. So they’ll be ready no matter what happens. Setting priorities is a big goal in our work. Today, we have a lot of customers. Right now, we’re helping both a professional basketball team and a biotech company optimize their cyber risk management programs. It’s great to be able to use the same approach to help organizations that are so different in just about every obvious way. But, just under the surface, they are both very similar in terms of the cyber risk practices they need to follow. My mission is to enable executives to become more proficient cyber risk managers. Our customers include the U.S. Federal Reserve Bank, Boeing, Visa, Intuit, Mitsubishi, DuPont, and many others. And, because so many organizations in the US need better cyber risk management at the executive level, we’ve launched a partnership program so other professionals in positions of trust, such as lawyers and technology service providers, can use our tools and methods to help their existing customers thrive as cyber risk managers. Ask me about it!
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 33
    • duration 1:39:03
    • English subtitles has
    • Release Date 2023/07/02