Error loading player: No playable sources found

Monitoring and Communicating Tech Risk

Date
October 25, 2023
Credits
1 CPE | Expired January 31, 2024

Analyze recent industry survey results and CEO statistics to determine why we need to focus on cyber risk now. You’ll gain an understanding of risk metrics, starting with risk appetite. Learn how to set thresholds in line with risk appetite, construct risk metrics and go through the build process. Explore how effective risk reporting drives risk decisions.

Learning Objectives

  • Define risk appetite.
  • Apply the risk metric build process
  • Employ the strategies in risk reporting.

Speaker

Speaker Image for Priya Mouli
Priya Mouli, MBA, CDPSE, CISSP
Technology Leader and Cyber Security Advisor | Board Member, PwC LLP

Related Products

Thumbnail for Legal and Compliance Issues - On the Brink of A Global Cybersecurity Crisis
Legal and Compliance Issues - On the Brink of A Global Cybersecurity Crisis
Executives and boards should ensure they understand the potential multijurisdictional conflicts that may arise from differing privacy and data protection laws around the globe…
Thumbnail for Self-Protecting Data - an Artificial Intelligence & Zero Trust Use Case
Self-Protecting Data - an Artificial Intelligence & Zero Trust Use Case
Recently, data surpassed oil as the world's most valuable asset. Current data protection methods have too many dependencies on systems and networks through which data passes. So far, attempts to solve this problem have not adequately minimized external dependencies…
Thumbnail for How to Get the Cybersecurity Budget You Need
How to Get the Cybersecurity Budget You Need
A major problem with cybersecurity programs today: CISOs get the budgets they’re believed to deserve, not the budgets they need. Cybersecurity program design and budgeting is traditionally driven by the current program and budget, and any enhancements are based on this set…
Thumbnail for Endpoint Security in the Age of Remote Work
Endpoint Security in the Age of Remote Work
Delve into the challenges of securing remote endpoints. This session will cover device management, secure access, data protection and employee training. By analyzing real-world case studies and best practices, you’ll gain actionable insights for protecting remote endpoints…