Contact Us

Continuity Insights Management Conference

Mitigating External or Insider Risk – A 5-Step Process

Mitigating risk requires a coordinated program for risk and security management, whether the attack originates externally or internally from disgruntled employees, contractors or supply-chain partners.

Saryu Nayyar, an internationally recognized cybersecurity expert, author, speaker and member of the Forbes Technology Council, presents a five-step program that provides a road map for mitigating threats in any environment. The five steps include:

  • Starting with the highest-risk users and entities
  • Implementing risk-based controls
  • Removing friction with risk-based authentication
  • Executing continuous mitigation
  • Acknowledging time is not on your side

Read Nayyar’s full post on her five-step framework via Homeland Security Today.com.

Continuity Insights

Similar Articles

Free White Paper: The Perfect Apology

Rothstein Publishing has made The Perfect Apology, written by James E. Lukaszewski, available as a free white paper download. Lukaszewski is the author of the landmark book Lukaszewski on Crisis …

Why People Should be at the Heart of Business Continuity Planning

When was the last time you stopped to consider the importance of your employees in running your business? It’s a question worth answering because, obviously, no organization can function without …

Communicating Clearly in a Crisis

In order to communicate information to all affected parties in the event of a data breach, pre-defined messaging and tailored responses are needed to effectively support any crisis management program. …

Leave a Comment

Share to...