The Real Cost of Reputation Risk – An Introduction

The Federal Reserve System defines reputation risk as “the potential that negative publicity…whether true or not, will cause a decline in the customer base, costly litigation, or revenue reductions.”  FISMACS Reputation Risk Series was designed to educate organizations on the full cycle of reputation risk management … Read more

How to Avoid and Combat Reputation Risks

The Federal Reserve System defines reputation risk as “the potential that negative publicity…whether true or not, will cause a decline in the customer base, costly litigation, or revenue reductions.”  FISMACS Reputation Risk Series was designed to educate organizations on the full cycle of reputation risk management … Read more

Decision Support Models for Cyber

If ever there was a field ready, willing, and able to use data to drive decision-making, cybersecurity is that field. In some industries, the transition from what is fundamentally opinion-based decision-making to data-driven decision-making can be a hard sell. For people who don’t work with data … Read more

Female Pioneers in Technology

As with any exploration of history, it can take additional effort to surface the stories of women. Too often excluded, erased, or diminished in the retelling of history, women have nonetheless made significant contributions to the technology field, stemming from their groundbreaking work in scientific coding, programming, cryptology, and innovation.   Here are some of … Read more

When the “One who Knocks” is Already Inside the House

Perhaps the most fascinating and overwhelming aspect of cybersecurity is knowing that the threats can come from anywhere. Sometimes systems are hacked by sophisticated, organized criminal hackers, and other times, it’s by people we would never suspect.  While the school security team and admins were over … Read more

Attackers Take a Page From Nature

A predator will lie in wait for its prey, often camouflaged blending into the background. Then, when the unsuspecting victim gets too close, it attacks without mercy. Such is the way of nature, and so too has become the way of the cyber-attack. The attack is … Read more

CISO Strategy

X