Manage Digital Risk
Address Critical Business Needs
Bridging the Gap of Grief with Business-Driven Security
There is a disconnect between security and its business counterparts.
Read more
The Gap of Grief
How bad is it? When a security incident occurs, how confident are you that you can explain the impact to the rest of the organization in language that they understand? Despite all the money we have invested in security, it’s still too difficult to put security details in business context fast enough. When you can’t,...
Blues and Bridging the Gap of Grief
The sound of blues flooded our ears, as approximately 2,000 information security professionals settled into the Ernest N. Morial Convention Center in New Orleans, LA, for the third annual RSA user conference, RSA Charge, from Oct 25-27. With our stomachs stuffed with local popular fare inclusive of crawfish, oysters & biegnets as we traversed Bourbon Street to...
Fraud Management Metrics that Drive Investment
If your role is responsible for a budget, your work ultimately revolves around one word: metrics. It is a word we often dread, because we can never seem to get it right. I live and breathe metrics in marketing, and if you are the gal or guy responsible for the fraud management or cyber security...
Where Is My Cybersecurity Rosetta Stone?
This week’s theme for National Cyber Security Awareness Month is “Cyber from the Break Room to the Board Room.” Communication, like anything else worth getting better at, takes practice. Sometimes it takes planning to know what we want to say and how we want to say it. We also need to anticipate who our audience is...
Leading in an Era of Chaos
Consider… American Authorities are confident that the Russian Government was behind the cyberattack on the Democratic National Committee. Did that attack change the course of the U.S. presidential election? We’ll never know. But it definitely changed the discourse that followed. The idea of a foreign power mounting a cyberattack to undermine a U.S. election went...
Risk Is a Reality, Make Sure Rewards are Too
Return on investment. Total cost of ownership. Productivity gains. Payback period? What am I – a financial wizard or a risk professional? If you are in the risk management profession today, you have to be both. Being a top notch security guru that can navigate SQL injection code or rattle off the NIST 800-53 control...
Business-Driven Security to Lead through Chaos
My last post discussed the changing nature of security. The impact of today’s cyberattacks aren’t limited to stealing financial information or personal data. Instead, these attacks seed chaos. With this reality at hand, the need for business-driven security is even more pronounced. Security professionals must draw connections between the technical details of a...
Defining Business-Driven Security for the Modern Enterprise
As I travel around the world and meet with CISOs and security teams, I continue to be amazed at the organizational disconnects around managing cyber risk. Security Operations and Identity & Access Management teams operate their own business processes with very few connection points. Security and Risk & Compliance teams have different world views of...
Delivering on the Promise of Business-Driven Security Globally
Today, with the introduction of RSA Business-Driven Security, we also introduced the RSA Risk and Cybersecurity Practice. This Practice includes more than 650 globally deployed, employee-based cybersecurity and risk experts to help our clients operationalize their unique business-driven security strategy. Our primary tenant is enabling and accelerating the business...
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.