CONTACT US

Cybersecurity and Privacy – What You Need to Know (Post 1 of a Series)

This is the first of a series of blog posts focused on mitigating cybersecurity risks. Our experts, including Jerry Ravi and John Fodera, will discuss topics such as understanding risks, effective risk management practices and tools, written information security programs (WISPs), and much more.


With advances in technology, breaches in cybersecurity and privacy are increasing and often in the news. Sometimes people ask, “How did this happen”.  As the adage goes, hindsight is always 20/20. However, with proper preventive/detective controls and risk management programs in place, companies can mitigate their risk of suffering a breach and have a planned and scripted response should a breach occur.

Cybersecurity is a concern for public and private companies of all sizes. This blog series will be ongoing and evolve, just like the topic itself, which is continuing to be a focal point of discussion at all levels, including in the board room. As technology evolves and more and more people are relying on mobile devices as their primary access channel to products, services and other data, hackers and criminals will find new and better ways to get to secure information. The important take-away of  this series is not only how to identify cybersecurity risks within your company but also how to create a written plan to guide you when an incident occurs and you need to respond. 

This blog series is for executives, board members and anyone concerned about managing risk within their organization.  In addition to cybersecurity risks in today’s environment and response plans, we’ll also cover key methods to improve your security and risk management posture.

Areas of focus include:

  • Understanding cybersecurity risks and the profile of potential perpetrators 
  • Effective risk management practices and tools
  • Trends and regulatory concerns
  • Addressing security risks to outsourced and cloud providers 
  • Mitigating the risk of being hacked
  • Creating a cost effective security assessment process
  • Cybersecurity Tip Sheet

We will also include relevant and timely news on cybersecurity breaches so we can learn from the affected companies’ responses. Whether the response is considered good or bad in the eyes of the media, each incident is a learning experience for all businesses and can lead a company to a better response and risk mitigation strategy. 

Coming next week,  “Understanding Cybersecurity Risks” will discuss some of the risks to consider as you develop your overall cyberssecurity risk management plan.

 

Jerry Ravi's focus is Enterprise Risk Management ERM and internal audit and compliance. He assists in designing enterprise risk management programs ERM which include deploying risk-based internal audit plans to enhance governance processes and monitor on-going compliance.

Contact Jerry

* Required