9 afleveringen

Cyber Risk Management Group (CRMG) is a provider of information risk and cybersecurity consultancy services. CRMG partners with organisations of all sizes and backgrounds to implement pragmatic approaches to cyber security and risk management that achieve the right balance between risk profile, regulatory requirements and resources available

Cyber Risk Fundamentals CRMG

    • Technologie

Cyber Risk Management Group (CRMG) is a provider of information risk and cybersecurity consultancy services. CRMG partners with organisations of all sizes and backgrounds to implement pragmatic approaches to cyber security and risk management that achieve the right balance between risk profile, regulatory requirements and resources available

    How to Fast-Track Your Cybersecurity Journey with a No-Nonsense Gap Assessment

    How to Fast-Track Your Cybersecurity Journey with a No-Nonsense Gap Assessment

    How to Fast-Track Your Cybersecurity Journey with a No-Nonsense Gap Assessment by CRMG

    • 21 min.
    CRMG Podcast: Managing Cyber Risk While Growing an Online Business

    CRMG Podcast: Managing Cyber Risk While Growing an Online Business

    The emergence and rapid growth of online retail is a great example of how businesses can move most of their operations online. Even businesses that don’t sell their products or services online are now benefiting from increased customer engagement and interaction from using digital platforms. However, while moving online has many benefits and opportunities to scale, it also creates many vulnerabilities and opportunities for cybercriminals.

    Businesses online activity has seen an increase by 50% to 100%. This is a huge increase which creates a huge burden on the IT department and generates new threats they are unprepared for.

    In the second part of this podcast conversation with CyBourn, we discuss the attack trends in the online space for rapidly growing online businesses, and how organisations can overcome these threats.

    • 36 min.
    Data Ownership - a critical step in cybersecurity

    Data Ownership - a critical step in cybersecurity

    The pace and scale at which we create and share data is greater than ever before. With such an abundance of information, data ownership is a real challenge for organisations, with many finding it too difficult to determine the data they own, and who is responsible for what.  Once organisations assign data owners who understand what they are accountable for, how to manage risk to their data, and buy-in to the responsibility of being an owner, they can truly be an asset to the business - and a critical step in cybersecurity.  In this podcast, Nick Frost, Co-Founder & Director at CRMG and Simon Lacey, Principal Consultant at CRMG, discuss why organisations that define data owners will be in a stronger position with their information security than those that don’t. Nick and Simon also share examples of how to identify and assign data owners, and how to get buy-in from the people who own data, and essentially the risk. 

    • 23 min.
    Data Ownership - a critical step in cybersecurity

    Data Ownership - a critical step in cybersecurity

    The pace and scale at which we create and share data is greater than ever before. With such abundance of information, data ownership is a real challenge for organisations, with many finding it too difficult to determine the data they own, and who is responsible for what.

    Once organisations assign data owners who understand what they are accountable for, how to manage risk to their data, and buy-in to the responsibility of being an owner, they can truly be an asset to the business - and a critical step in cybersecurity.

    In this podcast, Nick Frost, Co-Founder & Director at CRMG and Simon Lacey, Principal Consultant at CRMG, discuss why organisations that define data owners will be in a stronger position with their information security than those that don’t. Nick and Simon also share examples of how to identify and assign data owners, and how to get buy-in from the people who own data, and essentially the risk.

    • 23 min.
    Remote Working and the New Cybersecurity Threat Landscape

    Remote Working and the New Cybersecurity Threat Landscape

    Since the outbreak of COVID-19, there has been a period of major transition and organisations have had to quickly adapt to weather the storm. Many businesses have managed to remain operational but with all-new working processes. Organisations have adopted enterprise-wide remote working which likely required the rapid adoption of technology and a much greater reliance on existing or new digital infrastructure.

    Unfortunately, this rapid transition to remote working has left organisations open to cybersecurity vulnerabilities, and cybercriminals have been more than ready to exploit them.

    In this podcast with CyBourn, a managed detection and response provider, we share the alarming trends and attack patterns witnessed since the rise of remote working, and what we anticipate to see as we move into the new norm.

    • 20 min.
    Why Cybersecurity Policy is Still King

    Why Cybersecurity Policy is Still King

    Developing an effective cybersecurity policy is a fundamental stepping stone when creating a comprehensive cybersecurity plan. Like any other corporate policy, they are a roadmap that defines what is in scope and establishes the baseline for ‘good’ cybersecurity practices.

    A key challenge for leaders, however, is getting key stakeholder input. Traditional policies are often written in silos – in ways that are not clear to the audience they are meant to influence. Stakeholder contributions and their understanding of the language and purpose of the policy/s is an essential phase when implementing cybersecurity processes and awareness. Without them, it will not influence the business.

    In this podcast, Nick Frost, Co-Founder and Director at CRMG, is joined by Simon Lacey, Principal Consultant at CRMG. Together they discuss the following:

    • The lifecycle of a cybersecurity policy
    • The questions you should ask when creating or reviewing existing policies
    • Who you should get involved (stakeholders) within the organisation and the language to use to engage the business
    • Language and crafting – translating cybersecurity requirements to those who aren’t in cybersecurity

    For more information visit www.crmg-consult.com.

    • 15 min.

Top-podcasts in Technologie

Acquired
Ben Gilbert and David Rosenthal
✨Poki - Podcast over Kunstmatige Intelligentie AI
Alexander Klöpping & Wietse Hage
Bright Podcast
Bright B.V.
De Technoloog | BNR
BNR Nieuwsradio
Lex Fridman Podcast
Lex Fridman
Tweakers Podcast
Tweakers