ABSTRACT

Inherent cyber risk gets into the nitty-gritty of how to financially quantify cyber risk and benchmark digital assets comparatively. It allows readers to make their own cyber risk models based on what is more strategic to their organizations. It provides the actual method to the madness and algorithms used to score risk based on having no controls in place or as if there is zero percent effectiveness of the cyber controls. It provides comparative information on security frameworks and regulations across geographies, industries, and data types. It allows for strategic questions to be answered. What are our crown jewel assets? Which of our digital assets have the most reputational risk? How much loss is associated with each? Which digital assets have crown jewels that may be breached if the breach is not in isolation? Which digital assets are customer facing, and what are their financial and reputational loss potentials? How many cloud systems do we have? What does that risk look like? How much cyber exposure do we have? How much cyber insurance do we need? How does reputational risk influence financial risk? Are we monitoring the crown jewels? How many of our systems are end of life? What’s the relationship between privacy assets and risk? And much more, making you a thought leader in cyber.