Trend and Insights
from Resilience

All Resources

Cyber Resilience in Vendor Contracts

The indemnification clause should change based upon the nature of each party’s business, and a buyer needs to consider how it would be best protected by specific language concerning indemnification for loss arising from a data breach or cyber attack.

Introducing The Resilience Solution

At Resilience, we believe organizations need a new way to assess, measure, and manage their cyber risk. Our approach enables finance, risk transfer, and security leaders to align and prioritize informed decision-making for investments around security controls and risk transfer. We call this alignment of objectives Cyber Resilience.

How Cyber Resilience Tolerates Losses Within Limits

After taking an informal and unscientific poll, the most hated security question is, “Are we secure?” Only slightly better is, “Are we secure against known threats?” It’s rarely asked the second way. Both are dreaded – particularly in the boardroom.

Building a Defensible Security Budget: Part II

Resilience experts introduce the idea of using influence diagrams to visually capture the essence of security events for deeper conceptual understanding. Influence diagrams are a powerful way to represent the qualitative essence of the structural relationship between events and outcomes, whether those events are decisions we make or events outside our control (uncertainties).

1 4 5 6 7

Cyber Resilience starts here.

Request Demo