C-Risk is dedicated sharing quality insights with our readers. Our blog articles explore a range of topics with a focus on Cyber Risk Quantification, cybersecurity, and technology in business.
CISM: Navigating Cyber Risk Management
Explore CISM certification: its importance in cybersecurity, career benefits, and how it integrates with other certifications like FAIR to enhance information security management skills and expertise.
Melissa Parsons
Follow us:
Critical cybersecurity standards and frameworks for 2024
Explore key cybersecurity standards and frameworks for 2024, including ISO 27001, NIST CSF, and AI-specific guidelines. Learn their benefits beyond compliance.
The NIS 2 Directive: strengthening cyber resilience across sectors in the EU
Learn about the expanded scope of NIS 2 and the three pillars the Directive introduced for a safer, more resilient digital economy.
Advance Your Cybersecurity Career with CISA Certification
Validate your skills, gain a competitive edge, and explore career advancement opportunities in information systems auditing and security with a CISA certification.
Léa Goichon
Cybersecurity Certifications: A Major Asset
Cyber professionals can benefit from cybersecurity certifications at any point in their career. Certifications lead to career advancement, salary increases and career fulfilment.
Grégoire Paillas
ICS: Protecting Critical Infrastructure Systems
Learn about the evolution of ICS, the impact of cyber threats, and how CRQ can help identify the most effective critical controls to implement.
Simon Park
SEC final rules: cybersecurity in focus
Discover the SEC's final rules on cybersecurity, governance, and disclosures. Learn how to improve disclosures with quantitative and qualitative methods.
Eliza Davies
Protecting health data: challenges and solutions in cybersecurity
The healthcare sector is a major target for cybercriminals. And with the rise in cyberattacks, strong health data protection strategies are critical.
DORA: mitigating ICT risks and strengthening digital resilience
Gain insights into the EU's Digital Operational Resilience Act: its implications for financial entities, challenges for compliance and achieving digital operational resilience.
Industry 4.0: the challenges of industrial cybersecurity
Discover the core technologies driving Industry 4.0 and understand the operational cybersecurity challenges they bring.
CCSP: Mastering cybersecurity in the cloud
Dive into the world of cloud security certification with C-Risk's CCSP guide. You will gain a high-level overview of the six domains of cloud computing, how to prepare for the CCSP exam and the opportunities that await a certified IT professional.
CISSP: An in-demand certification for cybersecurity professionals
The CISSP is the gold standard for information security and cybersecurity professionals. Learn about its benefits, requirements, and how it boosts your career in information security.
Is Cloud Computing a Risk?
The Cloud & Your Digital Assets: CRQ Methods for Risk Management
Christophe Forêt
Fundamentals of Information Security: Risk as a Foundation of Cybersecurity
Explore the foundations information security, focusing on risk-based strategies to safeguard digital assets against cyber threats in the age of SaaS, IoT, and AI.
Cybersecurity in 2023: mitigating risk with good governance
Cybersecurity and information security risk management empowers organizations to make defensible decisions and build cyber resilience.
Cyber attacks: how to identify them and protect yourself effectively?
Cyberattacks are malicious attempts to harm a defined target. Find out how to protect your business against cybercrime in 2022.
Lydie Aubert
Cybersecurity governance best practices: the complete guide
What is cybersecurity governance? How and why should I implement cybersecurity governance?
What should your crisis management process be for a cyberattack?
How to apply the traditional crisis management procedure to a cyber attack? What specificities should you consider? What are the tools at your disposal?
The Sunburst supply chain attack explained
Discover how “The “Sunburst” supply chain attack impacted hundreds of businesses, and remains one of the most sophisticated and widespread cyberattacks.
Financial quantification - Ransomware losses
Follow this 4-step method based on financial quantification of risk to reduce your exposure to ransomware losses by measuring the financial impact of an incident.
CISO Budget Challenge
The current COVID-19 context is putting enormous pressure on companywide budgets including information security.
Quantifying controls efficiency for M&A
How to manage cyber risk in a Merger and Acquisition context? Watch discussion of experts from C-Risk and RiskLens in a 45 minutes webinar.
Is HAZOP applicable to cybersecurity?
The HAZOP method applies to the analysis of cyber risks of the industrial company. A guide to advantages, disadvantages and approaches applied to IT.
A guide to the EBIOS methodology: definition, procedure, limitations
What is the EBIOS cyber risk analysis method? Which structures can make use of it? What are its benefits and drawbacks?
ISO 27005: everything you need to know if you are considering implementing it
Learn everything you need to know about the international standard ISO 27005. Official definition, summary, methodology, advantages, and limitations.