Contact Us

Continuity Insights Management Conference

Mitigating External or Insider Risk – A 5-Step Process

Mitigating risk requires a coordinated program for risk and security management, whether the attack originates externally or internally from disgruntled employees, contractors or supply-chain partners.

Saryu Nayyar, an internationally recognized cybersecurity expert, author, speaker and member of the Forbes Technology Council, presents a five-step program that provides a road map for mitigating threats in any environment. The five steps include:

  • Starting with the highest-risk users and entities
  • Implementing risk-based controls
  • Removing friction with risk-based authentication
  • Executing continuous mitigation
  • Acknowledging time is not on your side

Read Nayyar’s full post on her five-step framework via Homeland Security

Continuity Insights

Similar Articles

Zerto Announces Senior Leadership Promotions

Cloud data management and protection provider Zerto has announced the promotions of Avi Raichel to the role of Chief Operating Officer and Deepak Verma as VP, Product Management. The two …

Integrated Preparedness Program: Coordinated Development and Implementation of Program Elements Can Reap Significant Benefits

The objectives of a preparedness program are to safeguard life, conserve property, maintain the continuity of operations, prevent environmental contamination, and protect reputations and relationships. Emergency management, business continuity, IT …

Facing Cybersecurity Risk? Here are 6 Ways to Minimize it

The cannabis industry is the latest target for cybercriminals. Why?

Leave a Comment

Share to...