If your organisation is still relying on traditional tools like colour-coded heat maps and qualitative risk assessments, it might be time to consider if those methods are providing the level of insight and precision your business needs to thrive in today’s fast-evolving risk landscape.
Risk
Are you covered? The case for quantifying cyber risk for insurance and strategic decision making
How quantifying your cyber exposure can reduce your insurance cost and improve coverage. As cyber threats continue to evolve and become more sophisticated, cyber insurance has quickly become an important tool in the risk management toolbox for many companies. However,...
WEBINAR: QUANTITATIVE IT-RISK ASSESSMENTS – TOOLS AND TECHNIQUES
Thursday, December 7, 2023 was an important day for ACI.We held our December seminar on IT Risk quantification.We were proud that more than 180 people had signed up for the seminar from more than 100 organizations across Europe.We shared experiences from 5 years of...
Part Two: ‘We Should Never Have Said That’ and How to Avoid It Being Used Against You Before It’s Too Late
Earlier this year, the first part of this article was published. It’s a good place to start to learn why you want to understand your company’s attack surface. Websites and online databases tend to over-share – you should aim to limit this. But some...
Webinar: An introduction to quantitative methods for cyber risk management
Almost daily, we hear about how cyber threats and IT risks increase globally across industries. Sadly, the methods and tools used for IT risk management today do not deliver the consistent decision support that organizations need. On March 23rd 2023, we conducted a...
ISO 27005 – What is it and how Is it Wrong About Quantitative Risk
The International Standards Organization recently published an updated version of their guidance for information security risk management, but they have missed the mark entirely on quantitative methods. What is ISO 27005? The ISO/IEC-27005 is one of the key standards...
What are information assets & how to Identify them in 5 steps?
An important step in any IT risk management process is to clearly define the information assets in scope. But what is an information asset really? How can you best describe your important information assets? And why is it so important to spend time on establishing a...
What’s the fun in that?
The last couple of years have reminded us of how dangerous and fluid the world is. It's become our new normal. War in Europe, climate changes, macroeconomic problems and cyber attacks are just some of our society's issues. Now, in Denmark, we talk a lot about...
Give me a number!
People are often asked about estimates in investments, the opening of new business areas, projects and budgeting. The estimates given are subject to uncertainty. No one can tell the exact amount, time etc., that will occur in the future. Despite this...
The simplest risk metrics that we just can’t agree on
Inherent risk… residual risk… current risk? When your risk manager or regulatory affairs asks about your “inherent risk”, it highlights a fundamental flaw in qualitative risk assessments. Here’s why - and how to fix it. Although most of us engage in some form of risk...