In cyber risk management, miscommunication is the real vulnerability.
When IT, security, and business leaders use different risk languages, priorities get lost in translation.
Build a unified risk framework so that everyone speaks the same language of risk, impact, and value.
22.10.2025 14:33 β
π 0
π 0
π¬ 0
π 0
ICYMI !!
I was named in the Top 30 of cyber experts by Cybercrime Magazine. The other 29 are incredible industry experts who have supplied a wealth of knowledge and insights to the industry over the years.
https://www.youtube.com/watch?v=i_KisFPdGj4
20.10.2025 14:55 β
π 0
π 0
π¬ 0
π 0
End-of-Life Systems Haunt Enterprise Security Networks
Windows 10 end-of-life on Oct. 14 will triple the number of vulnerable enterprise systems and create a massive attack surface for cybercriminals.
Many enterprises still rely on end-of-life systems.
8.5% of assets, in fact.
For ECRM, thatβs more than an IT concern; itβs a governance issue. These systems still βwork,β but without patches, they expand risk.
16.10.2025 15:00 β
π 2
π 0
π¬ 0
π 0
A few words from my course feedback stood out: invaluable, gained, and knowledge.
Thatβs what every professor hopes for.
But great learning sparks more questions, too. In cybersecurity, curiosity is key; itβs what keeps us authentic in a field that never stops changing.
A few words from my course feedback stood out: invaluable, gained, and knowledge.
Thatβs what every professor hopes for.
But great learning sparks more questions, too. In cybersecurity, curiosity is key; itβs what keeps us authentic in a field that never stops changing.
15.10.2025 14:51 β
π 2
π 0
π¬ 0
π 0
Leadership in cybersecurity isnβt only about owning every answer.
Itβs owning the approach.
Clear priorities, smart risk decisions, and empowering teams to act fast. Thatβs how you turn chaos into resilience.
08.10.2025 15:50 β
π 1
π 0
π¬ 0
π 0
Healthcare Cybersecurity: The Urgency Of Now
The health of patients β physical and financial β depends on how swiftly and efficiently the industry responds to the danger of increasingly sophisticated cyber threats.
Cybersecurity in healthcare = patient safety.
In 2024, 588 breaches hit 180M peopleβ750k records daily. Breaches take 279 days to detect, worsening harm. For 15 years, healthcare has led in breach costs.
The gap is growing: leaders must act now!
07.10.2025 14:43 β
π 1
π 0
π¬ 0
π 0
Cybersecurity isnβt just spotting threats.
Itβs understanding assets, vulnerabilities, and risk deeply. Mapping these connections lets teams prioritize, anticipate attacks, and protect not only their organization but also the people who rely on them.
03.10.2025 13:53 β
π 0
π 0
π¬ 0
π 0
Can AI Fully Replace Human Penetration Testers?
This week in cybersecurity from the editors at Cybercrime Magazine
Cybersecurity isnβt just technology.
Itβs AI plus human judgment. AI detects faster, but humans add context, strategy, and intuition. Together, they identify hidden risks, prioritize threats, and create smarter, more resilient defenses.
01.10.2025 15:31 β
π 1
π 0
π¬ 0
π 0
Cyber risk management doesnβt have to be scary.
Think of it like locking your doors, checking whoβs coming in, and having a plan if things go sideways. Know your assets, control access, and be ready to respond.
Thatβs the basics.
#Cybersecurity #RiskManagement #SimpleTips
26.09.2025 14:17 β
π 1
π 0
π¬ 0
π 0
Why organizations need a new approach to risk management - Help Net Security
To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls βreflexive risk ownership.β This is a future
We need more than reactive risk approaches.
Gartner calls it βreflexive risk ownership."
Assurance leaders coach, design systems, and reinforce behaviors to make #RiskManagement a culture, not just a process.
25.09.2025 14:30 β
π 1
π 0
π¬ 0
π 0
ECRM hot tip: Donβt just focus on preventing breaches.
Focus on minimizing impact.
Building resilience into systems, processes, and people ensures your organization can adapt, recover, and keep delivering value even when threats strike.
19.09.2025 15:32 β
π 1
π 0
π¬ 0
π 0
Solving 5 Top CISO Challenges
With concerns around AI, data privacy and overall cyber resilience growing, CISOs need to ensure operations are resilient in the event of an incident. Here are 5 ways you can respond.
CISOs today must balance preparation with resilience.
As AI reshapes both opportunity and threat, security leaders are called to be co-stewards of business goals. This means aligning protection with innovation in a boundaryless risk future.
17.09.2025 14:01 β
π 0
π 0
π¬ 0
π 0
Healthcare Data Breach Statistics
Healthcare data breach statistics from 2009 to 2024 in the United States, HIPAA violation statistics, and fines and penalties.
Since 2009, nearly 847M healthcare records have been breached. That's 2.6x the U.S. population. We have frequent flyers!!
In 2024 alone, 276M records were exposed, averaging 758K per day. Protecting health data is the only solution to trust and care.
12.09.2025 14:01 β
π 0
π 0
π¬ 0
π 0
Hot Tip: ERM is survival.
Map your critical assets, tie risks to business impact, and protect where it matters most.
Security without strategy = just noise.
10.09.2025 15:02 β
π 0
π 0
π¬ 0
π 0
Hereβs What CEOs Need to Tell Board Members About Cybersecurity
CEOs must ensure board members are equipped to challenge and guide the organizationβs cybersecurity strategy.
#Cybersecurity is now (always has been) a board-level issue.
#CEOs must lead deep, clear conversations with directors, aligning risk, resilience, and business goals. Beyond checkboxes, itβs about ownership, accountability, and building a true cybersecurity-first culture.
05.09.2025 16:01 β
π 3
π 0
π¬ 0
π 0
This #LaborDay, hereβs to the people who keep our communities moving.
Whether youβre building, teaching, serving, or caring. Your hard work, perseverance, and dedication make life better for all of us. Thank you for showing up, day after day.
This #LaborDay, hereβs to the people who keep our communities moving.
Whether youβre building, teaching, serving, or caring. Your hard work, perseverance, and dedication make life better for all of us. Thank you for showing up, day after day.
01.09.2025 15:13 β
π 1
π 0
π¬ 0
π 0
Great #RiskManagement includes #leadership.
When leaders engage in risk decisions, they set the tone for accountability, collaboration, and resilience.
Risk managed well becomes less about fear, more about strategy.
29.08.2025 14:00 β
π 1
π 0
π¬ 0
π 0
To end data breaches, do we need to rethink data sharing?
Third-party data breaches occur when personal data is stored, processed or managed not by the data owner. Are privacy-enhancing technologies the answer?
Over a third of #DataBreaches come from third parties, often when raw data is shared or stored externally.
Privacy-enhancing technologies (#PETs) change that, enabling insights and collaboration without exposing raw #data.
The result: fewer breaches, more trust.
27.08.2025 16:03 β
π 0
π 0
π¬ 0
π 0
#CyberRiskManagement is like navigating a ship through iceberg-filled waters.
You canβt avoid what you canβt see, and a solid #RiskAnalysis is your sonar. It reveals hidden dangers so you can steer safely toward your destination.
21.08.2025 13:33 β
π 2
π 0
π¬ 0
π 0
#RiskManagement isnβt just about avoiding disaster.
Itβs about making smarter, faster decisions with confidence. Whether you're navigating market shifts or cyber threats, a strong risk strategy turns uncertainty into opportunity.
#BusinessStrategy
14.08.2025 15:15 β
π 0
π 0
π¬ 0
π 0
How Strong Technology Infrastructure Drives Success In Hospitality
For hospitality businesses that have a well-oiled technology stack, IT can become a powerful differentiator that impacts the bottom line.
In hospitality, strong #IT isnβt just behind the scenes.
It is the scene. From seamless check-ins to secure networks, modern tech drives guest satisfaction, efficiency, and revenue. Outdated systems cost more than you think.
#HospitalityTech
12.08.2025 14:53 β
π 0
π 0
π¬ 0
π 0
#CyberRisk can be more than simply a tech issue.
When security becomes part of everyday decisions, not just policies, real change happens. The strongest defense starts with empowered, informed #WorkCultures.
08.08.2025 14:32 β
π 4
π 0
π¬ 1
π 0
New Report Reveals Just 10% of Employees Drive 73% of Cyber Risk
New research from Living Security and Cyentia shows Human Risk Management programs reduce #HumanCyberRisk 60% faster than traditional methods.
Visibility is key! Mature #HRM programs see 5x more risky behavior than security awareness training alone.
06.08.2025 14:45 β
π 0
π 0
π¬ 0
π 0
One of my former students said:
βThe word risk has become almost useless.β
UT Austinβs Sept course tackles that head-on:
Detect and Respond to Threats: Ransomware and Extortion
Taught by Todd Felker, ex-CISO.
π https://utaustin.catalog.instructure.com/browse/lhcrm/courses/detect-and-respond
01.08.2025 13:01 β
π 0
π 0
π¬ 0
π 0
Enterprise cyber risk management is like brushing your teeth.
You canβt skip it and expect no cavities.
Skimp on the basics (like patching & access control), and small issues become root canals. Prevention isnβt flashy, but it saves you pain (and $$$) later.
#CyberRisk #ECRM
31.07.2025 14:21 β
π 0
π 0
π¬ 0
π 0
How Medicaid cuts could endanger rural hospital cybersecurity | TechTarget
Learn about the ways in which reduced Medicaid funding for rural facilities could hurt rural hospital cybersecurity.
Rural hospitals are at risk.
With $1T in #MedicaidCuts, they may lose 21Β’ of every dollar, jeopardizing care, jobs, and #cybersecurity. Nearly 1 in 4 rural residents rely on Medicaid.
These cuts hurt more than health; they threaten entire communities.
25.07.2025 14:53 β
π 0
π 0
π¬ 0
π 0
πRISK SCENARIO #2: THE PILOT TAKES A NAP
A dozing pilot at 2,000 feet = high risk.
Asset: Pilot
Threat: Fatigue
Vulnerability: No rest policy
Risk: Navigational error
In cybersecurity, overworked people are your weakest link. Naps arenβt a control.
#CyberRisk #HumanFactors
23.07.2025 14:02 β
π 0
π 0
π¬ 0
π 0
Floating over ChΓ’teau de Fontainebleau in a hot-air balloon was breathtaking, until I spotted a #CyberRisk lesson in the sky.
πAsset: Balloon
π¦
Threat: Bird strike
πͺ‘Vulnerability: Worn fabric
Risk = all three combined. Same goes for your business. See risk clearly to manage it wisely.
Floating over ChΓ’teau de Fontainebleau in a hot-air balloon was breathtaking, until I spotted a #CyberRisk lesson in the sky.
πAsset: Balloon
π¦
Threat: Bird strike
πͺ‘Vulnerability: Worn fabric
Risk = all three combined. Same goes for your business. See risk clearly to manage it wisely.
16.07.2025 14:13 β
π 3
π 1
π¬ 0
π 0