Two of the potentially challenging things about doing information and cyber security risk assessments are being able to easily leverage any existing risk assessments done by other areas of the organization and being able to integrate the risk assessments we do with the existing risk ratings already being compiled and aggregated by the ERM team—assuming […]
Boys, wolves and Chicken Little
Folktales and fables are ways to make sure we learn life’s essential lessons both easily and at an early age. And two of the ones that I think are most relevant to what we do as security professionals are The Boy Who Cried Wolf and Chicken Little. Quick refreshers might be in order, so here […]