Utilizing CRQ to empower a shared cybersecurity accountability approach

While many organizations designate a single person as their cybersecurity lead, such as a chief information security officer, relying on one individual may not be the best approach.
Instead, many security experts and researchers believe that the best way forward is to share cybersecurity accountability and responsibility across a leadership team.
That's not to say that a CISO, chief information officer, IT manager or similar leader can't take a central role when it comes to cybersecurity.
Other key stakeholders such as CEOs, chief operating officers, board directors, and lines of business managers should also likely be involved and share at least some accountability/responsibility.
These other leaders can have valuable insights into different areas of the business that affect cybersecurity strategy.
In this article, we'll dive more into why a shared model is the way forward and take a look at how to implement this approach.
A key reason why cybersecurity accountability should be shared is that cybersecurity directly affects business issues.
A ransomware attack, for example, isn't just limited to IT figuring out how to remedy the attack and restore data access.
It can also affect areas like PR, considering that companies could need to manage public perception of the attack, especially if sensitive customer information leaks.
88% of boards of directors think of cybersecurity as a business risk, rather than just a technology risk, finds Gartner.
The good news is that more companies are starting to realize that cybersecurity is an enterprise-wide issue.
A 2021 KPMG global survey finds that CEOs ranked cybersecurity as the top risk to their organization's growth over the following three years.
In comparison, cybersecurity ranked fifth in the previous year's survey.
By taking a more collective approach, businesses can get a more thorough understanding of the risks they face and figure out ways to strengthen their defenses.
A CISO might have clarity on emerging cyber threats, for example, but they might not have the same day-to-day oversight over sales teams to make sure they're following corresponding protocols when handling customer data.
Getting to that point could require current leaders, such as CISOs, to put more effort into helping other executives and lines of business managers fully understand what's at stake.
One way to tell clear stories and put cyber risk in business terms is to use solutions such as Kovrr's cyber risk quantification platform.
Doing so can quantify cyber risk in financial terms, which can help non-technical leaders understand exactly what's at stake.
From there, executives and other key stakeholders can prioritize cybersecurity defenses based on financial risk and potential reduction of it.
That can be a natural way to keep other leaders, such as CEOs and CFOs, engaged and accountable when it comes to cybersecurity.


This Cyber News was published on securityboulevard.com. Publication date: Sun, 17 Dec 2023 17:13:04 +0000


Cyber News related to Utilizing CRQ to empower a shared cybersecurity accountability approach

Utilizing CRQ to empower a shared cybersecurity accountability approach - While many organizations designate a single person as their cybersecurity lead, such as a chief information security officer, relying on one individual may not be the best approach. Instead, many security experts and researchers believe that the best ...
11 months ago Securityboulevard.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
6 months ago Feeds.fortinet.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
10 months ago Securityzap.com
The Importance of Cybersecurity Education in Schools - Cybersecurity education equips students with the knowledge and skills needed to protect themselves and others from cyber threats. Cybersecurity education can teach students about the impact of cyberbullying, how to prevent it, and how to respond ...
11 months ago Securityzap.com
Shared Platforms Explained - In the world of enterprise technology, shared platforms like Kafka, RabbitMQ, Apache Flink clusters, data warehouses, and monitoring platforms are essential components that support the robust infrastructure leading to modern microservices ...
11 months ago Feeds.dzone.com
The US Needs To Follow Germany's Attack-Detection Mandate - To effectively combat these threats, the US needs to adopt a comprehensive and proactive approach to cybersecurity, similar to the one taken by Germany with its IT-SiG 2.0 mandate. The IT-SiG Approach Compared With the US's Current Capabilities One ...
11 months ago Darkreading.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
10 months ago Securityzap.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
4 months ago Techtarget.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
9 months ago Legal.thomsonreuters.com
Business Cybersecurity Culture: Building a Secure Workforce - To protect their operations and sensitive data, organizations must prioritize the development of a strong cybersecurity culture within their workforce. In this discussion, we will explore the crucial elements of a robust cybersecurity culture and ...
9 months ago Securityzap.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
10 months ago Securityzap.com
Gamification in Cybersecurity Education - Gamification has become increasingly prevalent in numerous domains, including cybersecurity education. Gamification presents a promising approach to meet this challenge, making cybersecurity education both effective and enjoyable. One way to ...
10 months ago Securityzap.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
11 months ago Feeds.dzone.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
10 months ago Securityintelligence.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
9 months ago Securityzap.com
Beyond Mere Compliance - Too often we continue to see executives whose approach to cybersecurity - compliance rather than protection - is strikingly similar to that of the ill-advised business owner whose minimal fire protection is designed only to meet the building code. ...
10 months ago Cyberdefensemagazine.com
Cybersecurity Workshops for Students - Cybersecurity workshops for students serve as an effective means to educate and empower the younger generation in protecting their digital assets. With proper planning and organization, cybersecurity workshops enable students to navigate the digital ...
10 months ago Securityzap.com
International Women's Day: Expanding cybersecurity opportunities in the era of AI - March is a meaningful month for me personally as we honor Women's History Month and International Women's Day. Some of the most powerful role models in my own life are the women who raised me and the community of women who've provided the support and ...
8 months ago Microsoft.com
Cybersecurity Awareness Campaigns in Education - Cybersecurity awareness campaigns in education are essential to protect digital systems and information. The target audience for cybersecurity awareness campaigns in education includes students, teachers, administrators, and other staff members. ...
11 months ago Securityzap.com
Omdia: Standalone Security Products Outsell Cybersecurity Platforms - In its many briefings with cybersecurity vendors, one of the most consistent themes Omdia hears is why enterprises need cybersecurity platforms. Instead, vendors claim, enterprises could get better outcomes if they give up their multitude of ...
11 months ago Darkreading.com
Essential Features of Cybersecurity Management Software for MSPs - Protect your clients' businesses from cyber threats with Cybersecurity Management Software. A vital tool that aids MSPs in enhancing their cybersecurity practices is Cybersecurity Management Software. In this article, we will delve into the features ...
5 months ago Hackread.com
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
10 months ago Darkreading.com
Key cybersecurity skills gap statistics you should be aware of - As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in ...
10 months ago Helpnetsecurity.com
What is the NIST Cybersecurity Framework? Definition from SearchSecurity - The NIST Cybersecurity Framework provides guidance on how to manage and reduce IT infrastructure security risk. NIST created the CSF to help private sector organizations in the United States develop a roadmap for critical infrastructure ...
10 months ago Techtarget.com
OT Cybersecurity: Safeguarding Building Operations in a Digitized World - These concerns are brought into the spotlight by high-profile ransomware attacks, which can now penetrate even the most intricate systems. Recently, in September, the gravity of this threat was illustrated when two Las Vegas casinos fell victim to an ...
10 months ago Cyberdefensemagazine.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)