loader from loading.io

Why Cybersecurity Policy is Still King

Cyber Risk Fundamentals

Release Date: 06/03/2020

Neurodiversity and Cybersecurity – Untapping a superpower show art Neurodiversity and Cybersecurity – Untapping a superpower

Cyber Risk Fundamentals

Diversity within teams is essential, and neurodiversity within teams can be powerful – cyber threats are becoming more and more advanced and pervasive, and so the teams we build to defend and outthink cyber criminals need to have different mindsets.

info_outline
How to Fast-Track Your Cybersecurity Journey with a No-Nonsense Gap Assessment show art How to Fast-Track Your Cybersecurity Journey with a No-Nonsense Gap Assessment

Cyber Risk Fundamentals

Organisations need to identify where their greatest cybersecurity risks lie, and how to close the gaps in a quick and cost-effective way. In this podcast, Nick Frost, Co-Founder and Director at CRMG and Martin Tully, Principal Consultant at CRMG share their experience working with organisations to conduct gap assessments and diagnostics of their cybersecurity programme, to make targeted changes fast.

info_outline
Data Ownership - a critical step in cybersecurity show art Data Ownership - a critical step in cybersecurity

Cyber Risk Fundamentals

In this podcast, Nick Frost, Co-Founder & Director at CRMG and Simon Lacey, Principal Consultant at CRMG, discuss why organisations that define data owners will be in a stronger position with their information security than those that don’t. Nick and Simon also share examples of how to identify and assign data owners, and how to get buy-in from the people who own data, and essentially the risk.

info_outline
Remote Working and the New Cybersecurity Threat Landscape show art Remote Working and the New Cybersecurity Threat Landscape

Cyber Risk Fundamentals

In this podcast with CyBourn, a managed detection and response provider, we share the alarming trends and attack patterns witnessed since the shift to remote working, and what we anticipate to see as we move into the new norm.

info_outline
Why Cybersecurity Policy is Still King show art Why Cybersecurity Policy is Still King

Cyber Risk Fundamentals

Developing an effective cybersecurity policy is a fundamental stepping stone when creating a comprehensive cybersecurity plan. In this podcast you will learn:

info_outline
Changing Senior Management's Perception of Cybersecurity for the Better show art Changing Senior Management's Perception of Cybersecurity for the Better

Cyber Risk Fundamentals

In the third episode of the ‘Cyber Risk Fundamentals’ series, Nick Frost is joined by Todd Wade and Andrew Wilson to explore what is now the biggest challenge for CISOs. Together they discuss:

info_outline
How to Manage Third Party Risk When you Have Thousands of Suppliers show art How to Manage Third Party Risk When you Have Thousands of Suppliers

Cyber Risk Fundamentals

In this podcast, CRMG’s Nick Frost, Todd Wade and Andrew Wilson discuss the key risks associated with third party suppliers, how to manage the process of on-boarding suppliers. and how to filter through suppliers to assess those most critical to your business. Our team also discuss the importance of managing the relationships with third party suppliers and the need for an exit strategy in the event of a split.

info_outline
A Pragmatic Approach to Defining your Threat Profile show art A Pragmatic Approach to Defining your Threat Profile

Cyber Risk Fundamentals

In this CRMG podcast, seasoned professionals in cyber risk and information risk share their insights and experiences threat profiling, the importance of defining your threat profile, and the threat actors that can influence your profile.

info_outline
 
More Episodes

Developing an effective cybersecurity policy is a fundamental stepping stone when creating a comprehensive cybersecurity plan. Like any other corporate policy, they are a roadmap that defines what is in scope and establishes the baseline for ‘good’ cybersecurity practices.

A key challenge for leaders, however, is getting key stakeholder input. Traditional policies are often written in silos – in ways that are not clear to the audience they are meant to influence. Stakeholder contributions and their understanding of the language and purpose of the policy/s is an essential phase when implementing cybersecurity processes and awareness. Without them, it will not influence the business.

In this podcast, Nick Frost, Co-Founder and Director at CRMG, is joined by Simon Lacey, Principal Consultant at CRMG. Together they discuss the following:
  • The lifecycle of a cybersecurity policy
  • The questions you should ask when creating or reviewing existing policies
  • Who you should get involved (stakeholders) within the organisation and the language to use to engage the business
  • Language and crafting – translating cybersecurity requirements to those who aren’t in cybersecurity