f 05,25

Capital One, Governance, and the 90% Rule in Cybersecurity

2025-05-21T20:05:50-04:00May 20th, 2025|

Most cyber breaches aren’t caused by elite hackers—they’re caused by missed steps, misconfigurations, and unclear accountability. The 2019 Capital One breach is a case study in how weak governance, not weak tech, opens the door to disaster. Here’s how stronger oversight could have changed everything—and why it still can.

f 09,24

Unique Aspects of GRC Cybersecurity in IT/OT Manufacturing

2025-05-21T21:46:12-04:00September 15th, 2024|

Manufacturing faces unique GRC cybersecurity challenges due to the convergence of IT and OT, complex global supply chains, and stringent regulatory requirements. Understanding these complexities is crucial for developing robust strategies that safeguard operations, intellectual property, and compliance.

f 12,17

Cyber Risk Board Oversight

2025-05-21T22:36:54-04:00December 28th, 2017|

The high-profile breach of Target's data reinforced that cyber security does not only impact IT but also the whole of a business. The resignation of the CEO and CIO underscored the repurcussions a cyber-incident can have on the confidence in an organization's leadership, market reputation, and shareholder value.

f 11,16

The Case for Audit

2025-05-21T22:34:10-04:00November 27th, 2016|

Admin Assistant Jane was considered a “trusted employee” by the non-profit’s CEO. Jane also happened to own a bridal business and was regarded a "fairy godmother" for having donated over a million dollars. So how was Jane able to pocket $5 million dollars over an eight-year period, undetected?

f 10,16

Cyberinsurance: Value Generator or Cost Burden?

2025-05-21T22:30:54-04:00October 11th, 2016|

Although larger companies may be equipped to weather a cyberstorm and its aftermath, 60% of small businesses close their doors within six months after an attack, making cybercrime an equal opportunity with unequal consequences. Some enterprises are beginning to consider cyberinsurance as a component of their risk transfer strategy.