Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed non felis faucibus, convallis ligula sed, laoreet quam. Nulla porta lorem nec augue varius egestas.
Sed vitae purus maximus, gravida mi a, ornare felis. Sed malesuada magna in enim porttitor sollicitudin. Phasellus fringilla orci felis, nec pellentesque augue rhoncus at. In sed nisi ultricies, dignissim erat eget, convallis neque.
Fusce non risus vitae arcu dictum sagittis. Nunc iaculis risus ac semper iaculis. Etiam justo nibh, porttitor et turpis sed, elementum dignissim ligula..
May 11, 2022 2:38:01 PM
The Harvard Law School Forum on Corporate Governance recently published an article, Proposed SEC Cyber Rules: A Game Changer for Public Companies, that outlines how new SEC rules could require an in-depth understanding of the potential liabilities related to cyber risk
May 11, 2022 8:54:28 AM
A major presence for the FAIR Institute at the upcoming RSA Conference June 6-9 with two days of training in the fundamentals of FAIR quantitative risk analysis and a morning seminar with Jack Jones, creator of Factor Analysis of Information Risk (FAIR), on the future of cyber risk measurement.
May 10, 2022 7:45:00 AM
In the previous post, I provided examples of some controls-related data that can’t be used to support automated cyber risk quantification (CRQ). But the news isn’t all bad. There are some data that can be used to support CRQ.
Sep 7, 2017 3:18:43 PM
I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they seemed to get hung up on the terms “inherent risk” and “residual...
Read More >>May 1, 2017 8:51:54 AM
The terms “risk appetite” and its close cousin “risk tolerance” are often poorly understood, very rarely used to good effect, and commonly used interchangeably.
Similar to the word “risk,” you will...
Read More >>Feb 6, 2019 2:00:00 PM
FAIR model creator Jack Jones recently answered a FAIR Institute member's question about terminology that's one of those easily confused yet critical distinctions in cyber risk management: What's the...
Read More >>