• About us
  • GRC-ERM Software
  • Applications
    • Enterprise Risk Management
    • Business Continuity Planning
    • Regulatory Compliance Management
    • Cybersecurity Risk Management
    • Risk-Based Auditing 
    • Third-Party Risk Management
    • Environmental Social and corporate Governance 
    • Information Security Management
    • Strategic Planning Management
  • FAQ
  • Insights
    • Blogs
    • Podcasts
    • Webinars
    • White papers
  • Contact us
z horse
  • About us
  • GRC-ERM Software

      Governance

      Balanced Scorecard

      Plan Management

      RSP Management

      Management Indicators

      Risk

      Risk Management

      Asset Management

      Business Impact Analysis

      Cybersecurity

      Event Management

      Incident Management 

      Compliance

      Assesments 

      Findings

      Audits

  • Applications
    • Enterprise Risk Management
    • Business Continuity Planning
    • Regulatory Compliance Management
    • Cybersecurity Risk Management
    • Risk-Based Auditing 
    • Third-Party Risk Management
    • Environmental Social and corporate Governance 
    • Information Security Management
    • Strategic Planning Management
  • FAQ
  • Insights
    • Blogs
    • Podcasts
    • Webinars
    • White papers
  • Contact us

REQUEST A DEMO
z horse
  • About us
  • GRC-ERM Software

      Governance

      Balanced Scorecard

      Plan Management

      RSP Management

      Management Indicators

      Risk

      Risk Management

      Asset Management

      Business Impact Analysis

      Cybersecurity

      Event Management

      Incident Management 

      Compliance

      Assesments 

      Findings

      Audits

  • Applications
    • Enterprise Risk Management
    • Business Continuity Planning
    • Regulatory Compliance Management
    • Cybersecurity Risk Management
    • Risk-Based Auditing 
    • Third-Party Risk Management
    • Environmental Social and corporate Governance 
    • Information Security Management
    • Strategic Planning Management
  • FAQ
  • Insights
    • Blogs
    • Podcasts
    • Webinars
    • White papers
  • Contact us

REQUEST A DEMO
Risk Management

Is Your Organization Cyber Fit?

By Jim Ambrosini 

I was reading a book by a legendary strength coach that had one of the best definitions of ‘Fit’ I’ve ever seen. According to him, “Fit” comes from a Norse word meaning” to knit together.” In his view as a lifelong athlete and trainer of champions, he felt that it was the best definition and went as far as to define the” fittest” athletes as martial artists, aerialists, dancers, and gymnasts. Why? Because they have a combination of strength, muscular development, stamina, and grace – it all flows together when they compete. There are no jerky movements or imbalances.

It got me thinking about cyber readiness, or, for the purpose of this article, being a “Cyber Fit” organization.

I believe the same definition applies. Organizations that have robust cybersecurity programs stand out from their peers. Their program operates such that all the elements are woven together; it just works.   However, finding a genuinely Cyber-fit company is becoming increasingly difficult. The landscape of digital assets, as well as privacy and security regulations, have grown over the decades. Companies no longer must protect what’s in their own four walls but deal with a global ecosystem of threats, adversaries, and legislation.

What tends to happen is that Cybersecurity becomes a patchwork of various tools and processes.  Some of these might provide value if they are used appropriately, but in their current state, the program cannot reap the benefits. It’s like being an athlete and having all sorts of muscle imbalances and mobility issues that are preventing optimal performance.

How do we fix this?

I believe the answer lies in utilizing Governance. Having a solid Governance program can solidify the effectiveness of Cybersecurity by identifying the gaps in your program and creating awareness and visibility.

The Governance program will have key performance indicators (KPIs) and Key Risk Indicators (KRIs) that demonstrate how well the program is working – or not. Some items to include are:

  • Click Rate of phishing program (measures the success of security awareness training).
  • % of assets scanned for vulnerabilities.
  • Number of systems with Critical vulnerabilities.
  • Average days to resolve Critical vulnerabilities on core systems.
  • Results of the last disaster recovery testing.
  • Unidentified devices on the network.
  • % of key vendors that have been risk-assessed.
  • Patching cadence.
  • % of the workforce that had cybersecurity training.
  • % of staff using MFA.
  • # of security incidents.
  • # of control exemptions.
  • Cyber spend as a % of total IT spend
  • Greatest / Emerging Cyber Risks

The above is not a complete list, but it’s one that I have used successfully with organizations to get them started down the Governance path.  It’s always amended to the specific needs and risk profile of the company. But the fact that a company uses tools and processes to produce this information puts them several notches above the rest.

The key is to present these metrics in an executive forum – such as at an Information Security Committee, a Risk Committee, or a Board meeting. This way, everyone can see the program’s strengths and areas for improvement. It also helps set priorities for the security roadmap and budgetary discussions.   

No cybersecurity program is perfect. But It’s only through Governance that you can help ensure your program has the best chance of becoming a functionally fit cyber organization to deal with the increasing threats.


The Forgotten Risks of M & A
Previous Article
FTX situation
FTX An Alternative Risk Perspective
Next Article

z horse

Contact Us
[email protected]

(800) 519-9078

New Jersey

116 Village Boulevard, Suite 200
Princeton, NJ 08540
(800) 519-9078

  • Home
  • About us
  • Blog
  • Contact us
Youtube Twitter Linkedin
Copyright 2021 by Z-Horse
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT