Search results

Your search for posts tagged with "Cyber Risk Oversight" has returned 111 results

December 1, 2022

Three Action Items to Get Started with Better Cybersecurity Oversight

Uber Technologies, Rockstart, Crypto.com, Microsoft Corp., and the International Committee of the...

By Kevin Korte

October 25, 2022

Geopolitical and Cyber Hot Spots: Galvanizing Risk Governance for Escalating China-Taiwan Tensions

In a year already unprecedented in its geopolitical tectonic shifts, twists, and turns, company b...

By Andrea Bonime-Blanc and Tomer Saban

October 19, 2022

A Crossroads for Cyber Insurance: Are You Really Covered?

Recently, Lloyd’s of London issued a bulletin that will require its insurer groups to separate st...

By James Turgal

September 28, 2022

How to Rationalize Cybersecurity Tools in Turbulent Times

Amid a strained economy, businesses everywhere are tightening their belts and working to ensure t...

By James Turgal

September 7, 2022

Advancing the Board’s Role in Digital Transformation

Every director should have sufficient digital understanding to engage in strategic conversations ...

By Jim DeLoach

August 23, 2022

SEC Cyber-Risk Governance and Its Boardroom Business Resilience Implications

Earlier this year the US Securities and Exchange Commission (SEC) released proposed cybersecurity...

By Chris Hetner

July 26, 2022

How Cybersecurity Experts Are Tackling Proposed SEC Rules, Working From Home, and More

The data security landscape is ever changing, and boards need to prepare themselves for future th...

By Natalie Heavren

July 21, 2022

Talent Remains a Top Concern for Boards Ahead of Growing Inflation, New Report Finds

NACD released findings from the 2022 NACD Public Company Board Practices and Oversight Survey rep...

By NACD Editors

July 20, 2022

Beyond the Buzz: Building Cyber Resilience

Resilience is everywhere these days, in analyst reports, marketing materials, and board tables. W...

By James Turgal

June 15, 2022

Contextualizing Cyber Risk: Mapping Business as a System

What would happen if one of your critical lines of business suffered a cyberattack? Would busines...

By Ken Stasiak