home.social

#riskmanagement โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #riskmanagement, aggregated by home.social.

  1. ๐™’๐™๐™คโ€™๐™จ ๐™ง๐™š๐™จ๐™ฅ๐™ค๐™ฃ๐™จ๐™ž๐™—๐™ก๐™š ๐™›๐™ค๐™ง ๐™ฅ๐™ง๐™ค๐™ฉ๐™š๐™˜๐™ฉ๐™ž๐™ฃ๐™œ ๐™™๐™–๐™ฉ๐™– ๐™ค๐™ฃ ๐™ช๐™ฃ๐™ช๐™จ๐™š๐™™ ๐™๐™–๐™ง๐™™๐™ฌ๐™–๐™ง๐™š

    #cybersecurity #informationsecurity #iso27001 #dora #digitaltransformation #cybergovernance #odit #isms #riskmanagement

  2. What happens when attackers weaponize cellular-based IoT?

    In this Nexus Podcast episode, Rapid7's Deral Heiland breaks down the #cybersecurity risks of connected #IoT devicesโ€”from unauthorized access and data exfiltration to potential pivots into backend infrastructure.

    ๐ŸŽง Full episode here: nexusconnect.io/podcasts/deral

    #VulnerabilityManagement #RiskManagement #OperationalResilience

  3. What happens when attackers weaponize cellular-based IoT?

    In this Nexus Podcast episode, Rapid7's Deral Heiland breaks down the #cybersecurity risks of connected #IoT devicesโ€”from unauthorized access and data exfiltration to potential pivots into backend infrastructure.

    ๐ŸŽง Full episode here: nexusconnect.io/podcasts/deral

    #VulnerabilityManagement #RiskManagement #OperationalResilience

  4. What happens when attackers weaponize cellular-based IoT?

    In this Nexus Podcast episode, Rapid7's Deral Heiland breaks down the #cybersecurity risks of connected #IoT devicesโ€”from unauthorized access and data exfiltration to potential pivots into backend infrastructure.

    ๐ŸŽง Full episode here: nexusconnect.io/podcasts/deral

    #VulnerabilityManagement #RiskManagement #OperationalResilience

  5. ๐™’๐™๐™–๐™ฉ ๐™๐™–๐™ฅ๐™ฅ๐™š๐™ฃ๐™จ ๐™ฉ๐™ค ๐™ค๐™ก๐™™ ๐™ก๐™–๐™ฅ๐™ฉ๐™ค๐™ฅ๐™จ, ๐™ฅ๐™๐™ค๐™ฃ๐™š๐™จ, ๐™–๐™ฃ๐™™ ๐™™๐™ง๐™ž๐™ซ๐™š๐™จ ๐™–๐™›๐™ฉ๐™š๐™ง ๐™ง๐™š๐™ฅ๐™ก๐™–๐™˜๐™š๐™ข๐™š๐™ฃ๐™ฉ
    #cybersecurity #informationsecurity #iso27001 #dora #digitaltransformation #cybergovernance #odit #isms #riskmanagement

  6. ๐™’๐™๐™–๐™ฉ ๐™๐™–๐™ฅ๐™ฅ๐™š๐™ฃ๐™จ ๐™ฉ๐™ค ๐™ค๐™ก๐™™ ๐™ก๐™–๐™ฅ๐™ฉ๐™ค๐™ฅ๐™จ, ๐™ฅ๐™๐™ค๐™ฃ๐™š๐™จ, ๐™–๐™ฃ๐™™ ๐™™๐™ง๐™ž๐™ซ๐™š๐™จ ๐™–๐™›๐™ฉ๐™š๐™ง ๐™ง๐™š๐™ฅ๐™ก๐™–๐™˜๐™š๐™ข๐™š๐™ฃ๐™ฉ
    #cybersecurity #informationsecurity #iso27001 #dora #digitaltransformation #cybergovernance #odit #isms #riskmanagement

  7. โ€œ๐˜›๐˜ฉ๐˜ณ๐˜ฐ๐˜ธ ๐˜ช๐˜ต ๐˜ข๐˜ธ๐˜ข๐˜บโ€ is not a data protection strategy.

    #cybersecurity #informationsecurity #iso27001 #dora #cybergovernance #digitaltransformation #legalcompliance #odit #isms
    #riskmanagement #assetmanagement

  8. ๐™๐™๐™š ๐™ก๐™ž๐™›๐™š๐™˜๐™ฎ๐™˜๐™ก๐™š ๐™ค๐™› ๐™ฎ๐™ค๐™ช๐™ง ๐™™๐™š๐™ซ๐™ž๐™˜๐™š - ๐™›๐™ง๐™ค๐™ข ๐™ฅ๐™ช๐™ง๐™˜๐™๐™–๐™จ๐™š ๐™ฉ๐™ค ๐™™๐™š๐™จ๐™ฉ๐™ง๐™ช๐™˜๐™ฉ๐™ž๐™ค๐™ฃ

    #cybersecurity #informationsecurity #iso27001 #dora #digitaltransformation #cybergovernance #odit #isms #riskmanagement

  9. ๐™๐™๐™š ๐™ก๐™ž๐™›๐™š๐™˜๐™ฎ๐™˜๐™ก๐™š ๐™ค๐™› ๐™ฎ๐™ค๐™ช๐™ง ๐™™๐™š๐™ซ๐™ž๐™˜๐™š - ๐™›๐™ง๐™ค๐™ข ๐™ฅ๐™ช๐™ง๐™˜๐™๐™–๐™จ๐™š ๐™ฉ๐™ค ๐™™๐™š๐™จ๐™ฉ๐™ง๐™ช๐™˜๐™ฉ๐™ž๐™ค๐™ฃ

    #cybersecurity #informationsecurity #iso27001 #dora #digitaltransformation #cybergovernance #odit #isms #riskmanagement

  10. ๐™ƒ๐™ค๐™ฌ ๐™–๐™จ๐™จ๐™š๐™ฉ ๐™ข๐™–๐™ฃ๐™–๐™œ๐™š๐™ข๐™š๐™ฃ๐™ฉ ๐™˜๐™ค๐™ฃ๐™ฃ๐™š๐™˜๐™ฉ๐™จ ๐™ฉ๐™ค ๐™จ๐™ช๐™จ๐™ฉ๐™–๐™ž๐™ฃ๐™–๐™—๐™ž๐™ก๐™ž๐™ฉ๐™ฎ
    #cybersecurity #informationsecurity #iso27001 #dora #digitaltransformation #cybergovernance #odit #isms #riskmanagement

  11. Was passiert, wenn Handy-Netze, Zahlungsverkehr und Krankenhรคuser gleichzeitig offline gehen? ๐Ÿ“ต Der neue Bericht von ITU & UNDRR warnt vor einer โ€ždigitalen Pandemieโ€œ. Lokale Stรถrungen in Seekabeln oder Rechenzentren kรถnnen globale Krisen auslรถsen. Wir brauchen dringend mehr digitale Resilienz!

    Details (EN):
    ๐Ÿ”— unognewsroom.org/story/en/3110
    ๐Ÿ”— itu.int/en/mediacentre/Pages/P
    ๐Ÿ”— itu.int/hub/publication/s-rep-

    #DigitalResilience #ITU #UNDRR #RiskManagement

  12. Securing AI Adoption Requires New Risk Oversight Approach

    As AI adoption accelerates, organizations are essentially onboarding fast-moving digital colleagues that require a new risk oversight approach - one that acknowledges their unique behavior and risk profile, which differs significantly from human workers. Traditional human-centric controls may not be enough to secureโ€ฆ

    osintsights.com/securing-ai-ad

    #AiAdoption #ArtificialIntelligence #EmergingThreats #RiskManagement #DigitalTransformation

  13. How do you keep your employees up to date on IT security?
    โ†’ Phishing campaigns, Microlearning, classroom training, โ€ฆ - What's your go-to method?

    hissenit.com/en/academy

    #itsecurity #securityawareness #infosec #ciso #training #riskmanagement

  14. Anthropicโ€™s Mythos was labeled โ€œtoo dangerous,โ€ prompting Project Glasswing. This piece examines the balance between innovation and safety, and the cybersecurity implications for organizations. Read the full analysis: wix.to/nsycT0g

    #AI
    #CyberSecurity
    #ResponsibleAI
    #TechLeadership
    #RiskManagement

  15. Anthropicโ€™s Mythos was labeled โ€œtoo dangerous,โ€ prompting Project Glasswing. This piece examines the balance between innovation and safety, and the cybersecurity implications for organizations. Read the full analysis: wix.to/nsycT0g

    #AI
    #CyberSecurity
    #ResponsibleAI
    #TechLeadership
    #RiskManagement

  16. Anthropicโ€™s Mythos was labeled โ€œtoo dangerous,โ€ prompting Project Glasswing. This piece examines the balance between innovation and safety, and the cybersecurity implications for organizations. Read the full analysis: wix.to/nsycT0g





  17. Anthropicโ€™s Mythos was labeled โ€œtoo dangerous,โ€ prompting Project Glasswing. This piece examines the balance between innovation and safety, and the cybersecurity implications for organizations. Read the full analysis: wix.to/nsycT0g

    #AI
    #CyberSecurity
    #ResponsibleAI
    #TechLeadership
    #RiskManagement

  18. Anthropicโ€™s Mythos was labeled โ€œtoo dangerous,โ€ prompting Project Glasswing. This piece examines the balance between innovation and safety, and the cybersecurity implications for organizations. Read the full analysis: wix.to/nsycT0g

    #AI
    #CyberSecurity
    #ResponsibleAI
    #TechLeadership
    #RiskManagement

  19. RE: mastodon.xyz/@nextcloud/116460

    "Eine technische Lรถsung ist keine, wenn jemand (anders) sie einfach (unbegrรผndet, undokumentiert, unabgesprochen) abschalten kann."

    Bei der Einordnung von "Lรถsungen" in die MaรŸnahmenhierarchie gerne mitdenken...
    #riskmanagement #hse #stop

  20. Introduction to the NIST Risk Management Framework:

    This post covers:
    โ€ข What the NIST RMF is and why it matters
    โ€ข The seven steps of the framework
    โ€ข How it fits into a broader security program

    Read here: graylog.org/post/an-introducti

    #Cybersecurity #NIST #RiskManagement #Compliance #RMF