Organizations have to address various forms and manifestations of risk: cyber risk, financial...">

Executive (dis)Orders: Cognitive and Systemic Risk in the Boardroom

Featuring

  • SecurityScorecard

About This Webinar

Organizations have to address various forms and manifestations of risk: cyber risk, financial risk, supply chain risk, among many others. Lately, it seems that a large portion of innovation and disruption thinking is coming from the bottom of the org chart, not from the top.

This session will dive into the most pressing strategic questions about risks that plague every business large and small. Building secure systems and technology platforms that are resilient and profitable is not impossible, but increasingly difficult unless we strive to understand often overlooked sources of trouble: cognitive risk and systemic risk.

Join Mike Wilkes, SecurityScorecard's CISO, to discuss what boards are talking about in regards to cybersecurity, the critical KPIs that boards should be constantly measuring, what is the CISO's role is in the process, and what innovation we can expect from the broader cybersecurity ecosystem.

About SecurityScorecard

SecurityScorecard is the global leader in cybersecurity ratings and the only service with over two million companies continuously rated. SecurityScorecard’s patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the only provider of instant risk ratings that automatically map to vendor cybersecurity questionnaire responses - providing a true 360-degree view of risk.

  1. Scott Bekker

    Host Scott Bekker Webinar Moderator ActualTech Media

  2. Mike Wilkes

    Featuring Mike Wilkes Chief Information Security Officer SecurityScorecard

What You'll Learn

  1. What makes an effective cybersecurity report
  2. How to incorporate third-party risk into board reporting
  3. Key metrics that the board cares about for defining, understanding, and quantifying cybersecurity threats
  4. How to set realistic expectations for deliverables