CIOs: Match security plans to your company's 'risk appetite'

In this free report from the CIO Executive Council, CIOs discuss their risk-management strategies for dealing with cybersecurity threats and the aftermath of a data breach.

risk reward ts
Thinkstock
Current Job Listings

This report from the CIO Executive Council (CEC), based on a webcast featuring Scott Angelo, CIO at K&L Gates, and Mike Plantinga, CIO at CIBC Mellon, explores CIO-level strategies for dealing with cybersecurity threats – before and after a data breach.

One step the report recommends is developing a “risk appetite statement” that identifies how much the organization is willing to spend on certain security threats.

The report also encourages CIOs to develop a plan for how to communicate with various stakeholders, such as the board of directors and outsiders, in case of a data breach.

To learn more, register to download the free report, which includes a link to the full CEC webcast.

To continue reading this article register now

How do you compare to your peers? Find out in our 2019 State of the CIO report