Contact Us

Continuity Insights Management Conference

Mitigating External or Insider Risk – A 5-Step Process

Mitigating risk requires a coordinated program for risk and security management, whether the attack originates externally or internally from disgruntled employees, contractors or supply-chain partners.

Saryu Nayyar, an internationally recognized cybersecurity expert, author, speaker and member of the Forbes Technology Council, presents a five-step program that provides a road map for mitigating threats in any environment. The five steps include:

  • Starting with the highest-risk users and entities
  • Implementing risk-based controls
  • Removing friction with risk-based authentication
  • Executing continuous mitigation
  • Acknowledging time is not on your side

Read Nayyar’s full post on her five-step framework via Homeland Security Today.com.

Continuity Insights

Similar Articles

You think ghouls and goblins are scary? Cyber-attacks are the real nightmare

October is Cyber Security Awareness Month. This year’s campaign theme — “See Yourself in Cyber” — demonstrates that while cybersecurity may seem like a complex subject, ultimately, it’s really all about people …

Answers to 5 Key Backup and Recovery Questions

The editors at Solutions Review have compiled information on the top five key backup and disaster recovery questions to ask solutions providers, including performance, scalability, cost of ownership, support, and …

Events Industry Council Releases Resources Business Continuity Guide

The Events Industry Council (EIC) released the Business Continuity Accepted Practices Guide. It is the latest guide produced by EIC’s APEX COVID-19 Business Recovery Task Force. The EIC guide focuses …

Leave a Comment

Share to...