Does your enterprise have a cyber risk profile? Is it continually updated? Is is 'a real-time profile?" (Does your enterprise know what a cyber risk profile is or why it might be necessary?) If yes to any of those questions, do you believe your enterprise cyber risk profile encompasses every, or at least most, of… Continue reading A Proposed Enterprise Cyber Risk Profile Framework [First Cut]
Tag: cyber
Cyber Predictions: You Don’t Know…
I believe that there are many unknowns in the Cyber Age. You can flash back to the 2X2 of "known-knowns", "known-unknowns", "unknown-knowns" and "unknown-unknowns" but I want to keep it somewhat straightforward. That's why I show the illustrative visualization below. It's my attempt of showing a relatively straight-forward visualization, a 2-dimensional visualization at that, of… Continue reading Cyber Predictions: You Don’t Know…
Cyber Attack Space Elements (Selective)
This blog post is just a "thinking out loud and writing it down" blog post about cyber attack space(s). Here are some of the elements of the cyber attack space: Enterprise IT-created / enabled business / system processes (or certain activities of those processes) are connected to the web; Mobile devices become "smart" and, as… Continue reading Cyber Attack Space Elements (Selective)
Possible Cyber Risk Financing Stack (For Large / Jumbo) & Mid-Size ?? Enterprises
The visual below is an illustrative cyber risk financing stack for Large / Jumbo enterprises. And maybe Mid-Size enterprises as well ??? For me, this stack visualizes a possible end-game for (re)insurers now selling cyber insurance. It reflects my point-of-view that (re)insurers should not be selling cyber insurance at all. Each segment of the stack… Continue reading Possible Cyber Risk Financing Stack (For Large / Jumbo) & Mid-Size ?? Enterprises
The Luxury of Being Cyber Secure Does Not Exist (Now or Ever) in the Digital World of Commerce
Someone on LinkedIn said that enterprises can become more cyber secure if they identify, choose, and ensure the firms they choose to conduct commerce have “value” and are cyber secure. (That statement triggered this blog post.) However, even systems we believe have value will themselves connect to other systems (which we may or may not… Continue reading The Luxury of Being Cyber Secure Does Not Exist (Now or Ever) in the Digital World of Commerce
The Skeptical Analyst: Let’s Talk Cyber !
I published the February edition of my Podcast "The Skeptical Analyst: Let's Talk Cyber !" yesterday. It's available on Apple Podcasts, Spotify podcasts, Amazon Music, Overcast, Castro, Castbox, Podfriend, Goodpods, and other podcast platforms. I discuss four cyber issues in this 17 minute podcast: Our Cyber-Forming World Traditional Risks vs Cyber Risks Cyber Attack Spaces Cyber… Continue reading The Skeptical Analyst: Let’s Talk Cyber !
Cyber Metric: The Density of Interdependence of Cyber Attack Spaces (First Cut)
In this post I discuss my: Description of cyber attack spaces; Thought process to get to the metric: 'Density of Interdependence' of cyber attack spaces; List of my working hypotheses as some bit of context; Choice of a visual to use the 'Density of Interdependence' metric; Marked up visual to support thinking about the metric;… Continue reading Cyber Metric: The Density of Interdependence of Cyber Attack Spaces (First Cut)
Suggested Annual Corporate Cyber Budget Elements
Suggested annual corporate cyber budget elements At this point-in-time on January 2, 2024, I think there are several budget elements which corporations should include, or consider including, in the list of known and probable (continual) annual cyber expenditures. My suggested annual corporation cyber budget elements are the: Cost of creating and maintaining a cyber insurance… Continue reading Suggested Annual Corporate Cyber Budget Elements
Chaos in the Cloud
(Excerpt from my book "Stone Tablets to Satellites: The Continual Intimate but Awkward Relationship Between the Insurance Industry and Technology", published June 2022 by Wells Media Group, Inc.) The cloud provides the infrastructure for many of the new risks that have emerged on the landscape of risk. An increasing number of emerging risks that will… Continue reading Chaos in the Cloud
High-Level Cyber Security Visual Participant Taxonomy: Individuals as Cyber Targets
This is a high-level visual participant taxonomy focused on individuals as cyber targets. It is a companion to my WordPress Blog post titled " High-Level Visual Cyber Participant Taxonomy: Corporations as Cyber Targets". Similar to the first corporate-focused cyber visual taxonomy, it is a pre-beta. This visual taxonomy is meant to capture the participants who… Continue reading High-Level Cyber Security Visual Participant Taxonomy: Individuals as Cyber Targets



