Preface
In our professional journeys, we encounter pivotal moments—be it a change of job, a new career path, or the adoption of an innovative perspective—that significantly alter our course. For us, a keen and focused curiosity sparked numerous enlightening discussions. These discussions laid the groundwork for an essential framework and a proactive, value-centric approach to managing security risks. This evolution of ideas and strategies culminated in the creation of a structured and comprehensive cyber risk management program.
Brian’s Story
A few years ago, on a flight to California with my wife as we headed off for vacation, I found myself asking a simple question that turned out to be a eureka moment (for me anyway). “What is a cyber risk management program?” It seemed simple at the time. But with a slow internet at 30K feet, I did some searching and couldn’t find an authoritative answer. What had raised the question was the document I was reading: the 2018 Securities and Exchange Commission (SEC) guidance to boards and corporate officers on cybersecurity oversight matters. In that guidance, the SEC stated that boards of directors and corporate officers must have oversight of a cyber risk management program. A satisfying answer to the question wasn’t in the guidance, nor any other material I could find. With the SEC’s expectation that companies had these answers, and with accountability hanging in the balance, it was an important question not to have an answer to.
Let me ...