Cyber risk: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Update.)
imported>Doug Williamson
(Add link to web exclusive.)
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
The risk of a failure of [[cyber security]].
''Operational risk management''.


The risk of a failure of cyber security, or the potential consequences of such a failure.


Sometimes written 'cyberrisk'.
Sometimes written 'cyberrisk'.
<span style="color:#4B0082">'''''Single point of failure'''''</span>
:"An outage at a key supplier caused by a cyber breach could lead to significant damage to profit and even to reputation longer term.
:Treasurers should look at third parties and partners, and ask who the business is dependent on.
:Would a single point of failure represent a significant risk?"
:''The Treasurer magazine, August 2018, p13.''




Line 10: Line 22:
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security: protecting your business and your clients]]
*[[Cybertheft]]
*[[Operational risk]]
*[[Outage]]
*[[Reputational risk]]
==Other links==
[https://www.treasurers.org/hub/treasurer-magazine/why-humans-are-the%E2%80%93weakest-link-in-cybersecurity Why humans are the weakest link in cybersecurity, The Treasurer Web exclusive, 2019]
[[Category:Knowledge_and_information_management]]
[[Category:Financial_risk_management]]

Latest revision as of 08:48, 8 October 2020

Operational risk management.

The risk of a failure of cyber security, or the potential consequences of such a failure.

Sometimes written 'cyberrisk'.


Single point of failure

"An outage at a key supplier caused by a cyber breach could lead to significant damage to profit and even to reputation longer term.
Treasurers should look at third parties and partners, and ask who the business is dependent on.
Would a single point of failure represent a significant risk?"
The Treasurer magazine, August 2018, p13.


See also


Other links

Why humans are the weakest link in cybersecurity, The Treasurer Web exclusive, 2019