{"id":11621,"date":"2022-10-13T10:04:00","date_gmt":"2022-10-13T10:04:00","guid":{"rendered":"https:\/\/zhorse.net\/?p=11621"},"modified":"2022-10-14T22:09:01","modified_gmt":"2022-10-14T22:09:01","slug":"is-your-organization-cyber-fit","status":"publish","type":"post","link":"https:\/\/zhorse.net\/risk-management\/is-your-organization-cyber-fit\/","title":{"rendered":"Is Your Organization Cyber Fit?"},"content":{"rendered":"\n

I was reading a book by a legendary strength coach that had one of the best definitions of ‘Fit’ I’ve ever seen. According to him, “Fit” comes from a Norse word meaning” to knit together.” In his view as a lifelong athlete and trainer of champions, he felt that it was the best definition and went as far as to define the” fittest” athletes as martial artists, aerialists, dancers, and gymnasts. Why? Because they have a combination of strength, muscular development, stamina, and grace – it all flows together when they compete. There are no jerky movements or imbalances.<\/p>\n\n\n\n

It got me thinking about cyber readiness, or, for the purpose of this article, being a “Cyber Fit” organization.<\/p>\n\n\n\n

I believe the same definition applies. Organizations that have robust cybersecurity programs stand out from their peers. Their program operates such that all the elements are woven together; it just works.   However, finding a genuinely Cyber-fit company is becoming increasingly difficult. The landscape of digital assets, as well as privacy and security regulations, have grown over the decades. Companies no longer must protect what’s in their own four walls but deal with a global ecosystem of threats, adversaries, and legislation.<\/p>\n\n\n\n

What tends to happen is that Cybersecurity becomes a patchwork of various tools and processes.  Some of these might provide value if they are used appropriately, but in their current state, the program cannot reap the benefits. It’s like being an athlete and having all sorts of muscle imbalances and mobility issues that are preventing optimal performance.<\/p>\n\n\n\n

How do we fix this?<\/h3>\n\n\n\n

I believe the answer lies in utilizing Governance. Having a solid Governance program can solidify the effectiveness of Cybersecurity by identifying the gaps in your program and creating awareness and visibility.<\/p>\n\n\n\n

The Governance program will have key performance indicators (KPIs) and Key Risk Indicators (KRIs) that demonstrate how well the program is working \u2013 or not. Some items to include are:<\/p>\n\n\n\n