Security

Ransomware Ready: How to Prepare for the Day You Get Locked Out

Ransomware Ready: How to Prepare for the Day You Get Locked Out

As widespread ransomware attacks force organizations to take the threat more seriously, it is critical to develop a clear response strategy.

 
Practical Lessons for Managing Cyberrisks

Practical Lessons for Managing Cyberrisks

These four principles are critical for risk managers facing increasingly frequent cyberattacks.

 
Strengthening Data Breach Protection

Strengthening Data Breach Protection

Businesses must do more than just implement security solutions to guard against fraud.

 
Risks and Opportunities for Drone Ships

Risks and Opportunities for Drone Ships

Autonomous technology may soon hit the seas as companies develop remote-controlled or even fully autonomous ships.

 
IoT Risks for the Oil and Gas Industry

IoT Risks for the Oil and Gas Industry

The internet of things has improved productivity and lowered costs in the oil and gas industry, but also introduces vulnerability to cyberattacks.

 
The High Risk of a Low Cyber IQ

The High Risk of a Low Cyber IQ

Every organization’s biggest cyberrisk is its employees—and even employees agree.

 
Creating a Human Impact Cyberattack Response Plan

Creating a Human Impact Cyberattack Response Plan

While most organizations have an information security plan in place to defend their data and infrastructure, they often are not as prepared to deal with the human consequences of an attack.

 
Cyber and the C-Suite: New Cyberrisk Responsibilities for Chief Risk Officers

Cyber and the C-Suite: New Cyberrisk Responsibilities for Chief Risk Officers

New regulatory standards are redefining the cyberrisk management responsibilities of chief risk officers and other executives.

 
Investing in the Insurtech Toolbox

Investing in the Insurtech Toolbox

New technology startups are shaking up insurance—and, potentially, risk management.

 
Notepad: Risk in Review – June

Notepad: Risk in Review – June

Hacking the French election, a unicorn fight, a reputation crisis at United Airlines and more.

 
How to Use the World Economic Forum’s Cybersecurity Principles

How to Use the World Economic Forum’s Cybersecurity Principles

Ten best practices for boards of directors and the C-suite to take a holistic, risk-based approach to cyberrisk.

 
Risk-Based Approaches to Cybersecurity

Risk-Based Approaches to Cybersecurity

Existing frameworks can help guide companies to improve cybersecurity practices.

 
Insuring Against Social Engineering Attacks

Insuring Against Social Engineering Attacks

Two key legal decisions have helped clarify social engineering coverage conditions.

 
Using Contracts to Curb Cyberrisks

Using Contracts to Curb Cyberrisks

The right contract language can help reduce an organization’s third-party cyberrisk exposure.

 
Notepad: Risk in Review – May

Notepad: Risk in Review – May

North Carolina’s bathroom bill repeal, the Atlantic hurricane season outlook and more.