CIOReview CIOReview
Women In Tech Review
  • Home
  • Technology
    • Agile
    • Artificial Intelligence
    • Audiovisual
    • Big Data
    • BlockChain
    • Business Intelligence
    • BYOD
    • Cloud
    • Cloud Migration
    • Cognitive
    • Content Delivery Network
    • Data Analytics
    • Data Integration
    • Data Visualization
    • Digital Accessibility
    • Digital Transformation
    • Digital Twin
    • Drone
    • E-Waste Management
    • Enterprise Architecture
    • FinTech
    • Gaming Tech
    • High Performance Computing
    • Infrastructure Security
    • Insight Engines
    • Internet Of Things
    • Machine Vision
    • Mainframe
    • Metaverse
    • Mobile Application
    • Networking
    • Predictive Analytics
    • Quantum Computing
    • Remote Tech
    • Robotics
    • RPA
    • SDN
    • Security
    • Simulation
    • Smart City
    • SOAR
    • Video Solutions
    • Virtual Data Room
    • Virtualization
    • Web Development
    • Wireless
  • Industry
    • Ad Agencies
    • Aerospace
    • Africa
    • Agtech
    • Automotive
    • Aviation
    • Banking & Insurance
    • Banking and Finance
    • Biotech
    • Canada us
    • Casino
    • Chemical & Allied
    • Construction
    • Consumer Packaged Goods
    • Contact Center
    • Defense
    • E-Commerce
    • Education
    • EMR-EHR
    • Energy
    • Financial Services
    • Food and Beverages
    • Government
    • Healthcare
    • Law Enforcement
    • Legal
    • Manufacturing
    • Marine
    • Media & Entertainment
    • Metals & Mining
    • Naval Tech
    • Non Profit Technology
    • Oil & Gas
    • Pharma & life sciences
    • Proptech
    • Public Sector
    • Retail
    • Sports
    • Startups
    • Telecom
    • Textile & Apparel
    • Travel & hospitality
    • UAE
    • Utilities
  • Platforms
    • Acumatica
    • Adobe
    • Amazon
    • Cisco
    • Dassault Systemes
    • Dell
    • DevOps
    • Google
    • HPE
    • HubSpot
    • IBM
    • Infor
    • Magento
    • Microsoft
    • NetApp
    • NetSuite
    • Oracle
    • Red Hat
    • Sage
    • Salesforce
    • SAP
    • SAS
    • Shopify
    • VMware
  • Functions
    • Compliance
    • Contract Management
    • Corporate Finance
    • Digital Marketing
    • Environmental Health And Safety
    • GDPR
    • Human Resource
    • Logistics
    • Procurement
    • Sales Tech
    • Supply Chain
  • Conferences
  • About Us
Go to...

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    • Home
    • Legal Tech Latam

    The Goldilocks Theory for Risk Management

    By Patricia Titus, Chief Privacy & Information Security Officer, Markel Corporation [NYSE:MKL]

    Join With Our Contributor Network

    On progress..
    Success! Thanks For Joining With Our Contributor Network.
    You Have Already Joined With Our Contributor Network
    Sorry! Something went wrong. Please try again.
    The

    Patricia Titus, Chief Privacy & Information Security Officer, Markel Corporation [NYSE:MKL]

    Companies need the flexibility to transform the way they do business in order to meet the market demands and security needs to transform its thinking. We know that technology hasn’t stopped evolving therefore adoption continues to grow at a rapid rate. This means security has to stop being viewed as the sales prevention team. The fact is security must become nimble enough to react to the changing demands and priorities of their business partners or they will be pushed aside in the interest of growing the bottom line.

    So how does security raise itself to the right level and be a key priority for the business. Education and awareness is one key to how you cultivate the security behaviors necessary for success, and even better if you can make it a key corporate goal or priority. One example is educating people about the harm that can be done by clicking on links from unknown sources to raise their awareness to phishing and other malicious activity. This process must be closely followed up with testing them on how well they’re performing and is an excellent way to keep employees on their toes. Keep in mind that educating them on what happens when security isn’t a priority is also a great way to change behavior. No one wants to be the person that is deemed the weakest link. Many people have tied this to performance goals of their employees with good success.

    Today’s digital transformation requires security professionals think outside the box and develop new ways of handling the dynamic way our companies adopt and use technology. Some are moving towards developing a ‘cloud first’ strategy which means they are moving as much as possible into cloud based service offerings or ‘as a service’ models. Cloud creates unique challenges for many companies who have a perception that they will lose control of their data, could suffer catastrophic outages or data breach. These are all the same concerns they should have with in-house systems which often isn’t the case. I have a strong opinion that some companies would increase their security posture if they moved to the cloud for some of their basic back office automation capabilities like email, calendar, etc. There are also plenty of options for ‘brokering’ the move to the cloud which can help eliminate some of the fear by adopting Cloud Access Security Broker (CASB) offerings. This solution can give you a sense that your security is being provided by a separate vendor from your Cloud provider. And the most important part is making sure you write a great contract with an exit strategy in mind.

      ​As companies continue to adopt cutting edge capabilities and technologies to help build the bottom lines, security must do the same   

    Having a well thought out approach to third party risk management and supply chain security and necessitates, the need to build proactive and rapid capabilities to assess risk with the third parties we partner with. Gone are the days of long-lead times to perform risk assessments, apply security governance and sometime deny the relationship with a third party because they seemed too risky. We now need to determine the risk tolerance level, layout the required checks and balances and allow the adoption of new and innovative capabilities with little to no lead times.

    As companies continue to adopt cutting edge capabilities and technologies to help build the bottom lines, security must do the same. We cannot rely on traditional capabilities but need to find new and innovative ways to visualize the risk to the business and assist them in grasping the full risk picture when making corporate decision. Imagine Company A has recently decided to acquire Company B to meet growth objectives and neglects to perform a cyber security risk assessment before the acquisition decision. After the deal closes Company A finds out that Company B had been hacked and their intellectual property was now for sale on the dark web to the highest bidder. Company B had no idea it was hacked and Company A is out a significant amount of money. In this case a risk assessment with a dark web search could have alerted Company A and kept them from making a poor acquisition decision.

    An area that Chief Information Security Officers continue to struggle with educating their company that there is no silver bullet when it comes to security and it’s important to have the right safety mechanisms in place which means there has to be adequate investment in cyber security. If companies recognize that investing in security is just like purchasing auto insurance. Just because you have car insurance doesn’t mean you’re not going to have an accident. But having a security program will help protect the information you’ve been entrusted with. But equally important is ensuring that there is a balance of investing the right amount in cyber security or what I like to call the Goldilocks Theory. Not too much security and not too little security but just right. The media has reported there are plenty of companies saying they’re spending millions on security and yet they still suffer a data breach. So what is the right level of security and how is it best approached.

    Several contributing factors are at play. First what is the vertical market you’re in and what threat actors are interested in your business. My experience in several vertical markets has shown me that no two companies are the same even if they’re in the same vertical market space. One rule of thumb I’ve followed over several years in this profession is that security is 80 percent people and process and 20 percent technology. All three people, process, and technology are critical to your success but using this simple reference point may help you put your security program into perspective. Deciding how to ensure your company is leveraging your security professional to the fullest has been a challenge for many companies and addressing security concerns as quickly as possible is very important. Many security professionals joke that ‘security is hard’ but I can honestly say that dealing with a security incident or data breach is much harder.

    Check this out: Top Risk Management Solution Companies

    See Also: Top Risk Management Consulting Companies In Europe

    On The Deck

    • Mainframe Migration Special

      2025-01-10

      #
    • Field Service Special

      2024-10-01

      #

    Editor's Pick

    • Unlocking the Power of Real-World Data: Driving Innovation and Impact in Life Sciences
      Unlocking the Power of Real-World Data: Driving Innovation and Impact in Life Sciences

      By Denise Juliano, Group Vice President of Life Sciences, Premier Applied Sciences

    • Scaling AI, Automation, And Workforce Innovation For The Future
      Scaling AI, Automation, And Workforce Innovation For The Future

      By Roberto Tovar Arellano, Digital & Data Tech Bp Manager

    • Trends Driving Automation Innovation
      Trends Driving Automation Innovation

      By CIO Review

    • Australian Government Expands AWS Partnership to Accelerate Digital Transformation
      Australian Government Expands AWS Partnership to Accelerate Digital Transformation

      By CIO Review

    • Unlocking the Benefits of Business Intelligence for Success
      Unlocking the Benefits of Business Intelligence for Success

      By CIO Review

    • The Path to Sustainable Agriculture Through Collaboration and Innovation
      The Path to Sustainable Agriculture Through Collaboration and Innovation

      By Anna Pierce, Director of Sustainability at Tate & Lyle

    • AWS Cloud Migration Challenges
      AWS Cloud Migration Challenges

      By CIO Review

    • ERP Migration Pitfalls - Considerations to Guarantee Success
      ERP Migration Pitfalls - Considerations to Guarantee Success

      By Enrique Leon, AI Enterprise Architect, American Sugar Refining

    • Navigating the Complexities of Sap Migrations in the Automotive Industry
      Navigating the Complexities of Sap Migrations in the Automotive Industry

      By Guiomar López García, Global SAP Director, ADLER PELZER GROUP

    • Navigating the Evolving World of Wine and Hospitality
      Navigating the Evolving World of Wine and Hospitality

      By Dave Gerardu, Wine Director, Happy Corner Hospitality Group

    Copyright © 2025 CIOReview. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy       |       Disclaimer