IDC PeerScape: Best Practices for a Successful Cyber-Risk Management Program

IDC PeerScape: Best Practices for a Successful Cyber-Risk Management Program

This IDC PeerScape discusses best practices for a successful cyber-risk management program."A cybersecurity risk management program identifies the potential risks facing any organization and then prioritizes and plans defenses to avert, mitigate, or accept those risks. In all cases, risk assessment should look at the business impacts of each threat and prioritize defenses in terms of how they protect business operations and processes and customer data," says David Weldon, adjunct research advisor with IDC's IT Executive Programs (IEP).

Please Note: Extended description available upon request.


IDC PeerScape Figure
Executive Summary
Peer Insights
Practice 1: Review and Upgrade Cybersecurity Measures and Tools as Needed in Reaction to New Threats
Challenge
Examples
County of San Bernardino, California
Net Health
TruStone Financial Federal Credit Union
Guidance
Practice 2: Treat Cyber-Risk Management as a Business Concern
Challenge
Examples
County of San Bernardino, California
Net Health
TruStone Financial Federal Credit Union
Guidance
Practice 3: Determine the Board's Risk Appetite; Communicate Vulnerabilities That Could Impact the Bottom Line
Challenge
Examples
County of San Bernardino, California
Net Health
TruStone Financial Federal Credit Union
Guidance
Practice 4: View Cyber-Risk Management as an Opportunity to Strengthen IT Systems and Architectures
Challenge
Examples
County of San Bernardino, California
Net Health
TruStone Financial Federal Credit Union
Guidance

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings