Understanding Cyber Exposure

8028232672?profile=originalThere is a weakness in cyber risk to focus on the technical issues. They are necessary but not sufficient if you want to understand and manage all your cyber exposures, which I define as the vulnerabilities that arise as a result of activity using computers and the Internet. There is a great range of these vulnerabilities that are not being addressed.

An example would be the exposures that arise through the use of Social Media if not managed and controlled. For example posts that reveal sensitive, or uncomplimentary information regarding your organization or its executives.

There are also exposures that arise in the areas of Compliance, the Internet of Things (IoT), Cloud Computing, and Privacy. That is not to say the technical exposures should be ignored, far from it, rather you need to have an overview of all your cyber exposures, or at least as many as can be found at the moment. 

We have prepared a course for the Global Risk Community that would help you address this issue.

Please check out the course Understanding Cyber Exposure - or copy and paste the following link into your browser http://globalriskacademy.com/courses/cyber-exposure/

I appreciate any and all comments regarding this view of the cyber risk environment.

Votes: 0
E-mail me when people leave their comments –

You need to be a member of Global Risk Community to add comments!

Join Global Risk Community

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead