It’s time to reevaluate your approach to cybersecurity risk
Whether you’re a chief cybersecurity officer or an admin, or whether you’re updating the malware list current in your anti-virus software, researching VPNs to find out the one least likely to sell you out, integrating AI into a company-wide workflow, or simply changing a password, we’re all confronted at least semi-regularly by the vexing awareness that even the most thorough steps we take to secure our data will only get us through until the next inflection point, major or minor, that changes what we must do.
If you work in IT, that also means you work within a fluid framework for assessing risk. Your budget is finite, the risks evolve, and thus you must always be asking which threats demand the most attention, and which assets merit the strongest defense. Periods of relative stability exist, but when the technology landscape changes dramatically, as it has with AI, it’s time to step back and rethink your strategy for prioritizing threats and choosing what to protect and how strongly you’ll protect it.
That’s what we’re exploring in our collection of articles this week, which we’re calling Recalibrating Risk Tolerance.
Story list
- How many companies really shut down after a data breach?
- When security debt catches up with IT
- The internal security threats that put your data at risk
- How IT can transition from fire fighter to risk manager
- How IT and senior business leaders see technology budgets
- How to determine your appetite for cybersecurity risk
- Ready, fire, aim: Corporate AI strategy ignores the risks
It helps to start with the facts, which makes IT management consultant Denis Tom’s myth-busting article about the true impact of security breaches on small companies such a great way to kick this project off. Then former IT director Rose de Fremery implores you to take tech debt seriously, especially when you’re assessing your tech stack against the current-day threat landscape.
We’ll follow those stories up with a handful of others this week, each exploring different lines of thinking to help you in your pursuit of a more secure IT and business environment. We’ll also add stories to this page as they go live, so bookmark and check back throughout the week to follow along.