I hope that insurance actuaries and other insurance professionals tasked with pricing and writing cyber insurance policies ask themselves questions like these: Are we taking into account that as we continue to sell cyber insurance in the Cyber Age, that AI technologies and their applications are increasingly making the risk space behave more indeterminate -… Continue reading A Few Insurer Cyber Cover Questions for 2025 (Reprint from August, 2025)
Category: CISO
Hospitals & Cyber Resilience
I'm not a doctor or any kind of healthcare provider. This blog post encompasses a jumble of assumptions, questions, and guesses. It palpably demonstrates that I am only a patient of the US healthcare system. But, I hope that I am making the right assumptions, questions, and guesses about hospitals (or the healthcare system overall) and cyber resilience. I'd like you to let me know with your comments to this blog post.
Systemic Cyber Risks: Ever Present, Ever Expanding (Originally published late 2023 – no changes)
I almost titled this post "Something Wicked This Way Comes" but I realized that systemic cyber risks are already here. They have come. There is no shutting the door to keep systemic cyber risks out. They are an attribute of any portfolio of two or more companies linked together through the use of the web.… Continue reading Systemic Cyber Risks: Ever Present, Ever Expanding (Originally published late 2023 – no changes)
Potential Categories of a Cyber Attack Space Topography
The concept of topography, specifically related to cyber attack spaces, has been rattling in my head for the past few months. What are the shapes of current cyber attack spaces? What are the shapes of future cyber attack spaces? What might a person include as categories (and elements of the categories) of cyber attack spaces… Continue reading Potential Categories of a Cyber Attack Space Topography
Cyber Predictions: You Don’t Know…
I believe that there are many unknowns in the Cyber Age. You can flash back to the 2X2 of "known-knowns", "known-unknowns", "unknown-knowns" and "unknown-unknowns" but I want to keep it somewhat straightforward. That's why I show the illustrative visualization below. It's my attempt of showing a relatively straight-forward visualization, a 2-dimensional visualization at that, of… Continue reading Cyber Predictions: You Don’t Know…
Cyber Attack Space Elements (Selective)
This blog post is just a "thinking out loud and writing it down" blog post about cyber attack space(s). Here are some of the elements of the cyber attack space: Enterprise IT-created / enabled business / system processes (or certain activities of those processes) are connected to the web; Mobile devices become "smart" and, as… Continue reading Cyber Attack Space Elements (Selective)
The Luxury of Being Cyber Secure Does Not Exist (Now or Ever) in the Digital World of Commerce
Someone on LinkedIn said that enterprises can become more cyber secure if they identify, choose, and ensure the firms they choose to conduct commerce have “value” and are cyber secure. (That statement triggered this blog post.) However, even systems we believe have value will themselves connect to other systems (which we may or may not… Continue reading The Luxury of Being Cyber Secure Does Not Exist (Now or Ever) in the Digital World of Commerce
Suggested Annual Corporate Cyber Budget Elements
Suggested annual corporate cyber budget elements At this point-in-time on January 2, 2024, I think there are several budget elements which corporations should include, or consider including, in the list of known and probable (continual) annual cyber expenditures. My suggested annual corporation cyber budget elements are the: Cost of creating and maintaining a cyber insurance… Continue reading Suggested Annual Corporate Cyber Budget Elements
Dangerous Divides: Cyber Risk Management
Each of us represents, at every moment in time, a totality of our life's experiences, including education, relationships, and work experiences. A never-ending growing part of our life's experiences include the impact that current and emerging technologies (and their associated applications) have on the manner in which we communicate; collaborate; consume entertainment and news; interact… Continue reading Dangerous Divides: Cyber Risk Management





