Podcasts

Episode #8: Exploring Public Cyber Policy and Incentives for the Private Sector

Jacquelyn Schneider, Director of the Hoover Wargaming and Crisis Initiative, and Davis Hake, Co-Founder and Vice President of Policy at Resilience, discuss how private and public sectors influence and implement emerging cyber-security policies.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #8: Exploring Public Cyber Policy and Incentives for the Private Sector

Policies inform security. Indeed, emerging policies could also threaten security if they are not well thought out by “the policy people.” In this session we learn the who and what of the policy people. How do they get involved with policy work that in turn affects our work, and how can we as security leaders start incorporating emerging policy concerns in our operational work and strategies.

On the go? Listen to our podcast on your favorite platforms.

You might also like

Contrasting and comparing FAIR with the Resilience solution

Contrasting and comparing FAIR with the Resilience solution

As market awareness of cyber risk quantification grows, we frequently receive questions from clients and curious risk managers about FAIR (Factor Analysis of Information Risk)—what it is, whether it truly provides accurate cyber risk quantification, the effort needed to set it up and maintain, and more. Clients often ask us to compare the FAIR methodology […]

How does Resilience establish the probabilities presented in my LEC?

How does Resilience establish the probabilities presented in my LEC?

Managing risk successfully at any level requires an understanding of a concept called “probability.” As both an insurance company (risk transfer) and a cyber risk management company, Resilience relies on understanding probabilities to price our services and to guide our clients to greater levels of cyber resilience. As we often receive questions from our clients […]

Moving beyond heat maps for better risk management

Moving beyond heat maps for better risk management

Heat maps are among the most widely used—and debated—tools for risk managers worldwide to communicate risks in their registries or project portfolios. Despite their popularity, we advise leaders seeking transparency in discussing risk and value to avoid relying on them. What are heat maps? Risk managers often use heat maps (or risk matrices) to represent […]

Cyber Resilience starts here.

Request Demo