Cyber Risk Quantification (CRQ)
Align your security investment to cyber risk expressed in financial terms
Third-Party Cyber Risk Management (TPCRM)
Manage your supply chain and third-party risk
Cyber security performance measurement
Manage your Cyber Reputation
Introduction to Cyber Risk Quantification (CRQ)
The basic principle of quantification of cyber risk in financial terms
Implementing Cyber Risk Quantification (CRQ) using FAIR™️
A detailed understanding of the FAIR taxonomy and analysis methodology
What definition for cyber risk? Which digital risk analysis methodology should you choose to efficiently protect your IT?
What is risk mapping? What methods should you follow to make it useful? Whom should you involve in the process? How to adapt it to cyber risks?
Cyber risk management means looking into the different definitions of risk as well as the resulting management methods.
The HAZOP method applies to the analysis of cyber risks of the industrial company. A guide to advantages, disadvantages and approaches applied to IT.
The FMEA method is qualitative. It is useful in order to draw up a mapping of cyber risks, based on subjective ordinal and nominal scales. Justifying and prioritising corrective actions is far more effective when done through a quantitative analysis.
Corporate phishing attempts are becoming more and more sophisticated, threatening the integrity of sensitive data. Here is all you need to know to make sure you are well protected!
MITM cyberattack: What Is It? How does it work ? How can you easily prevent it?
Ransomware poses the biggest cyber threat to businesses in 2021. How does it work? How to protect yourself from it?
crisis response team
Procedures you should follow to create a crisis response team to anticipate and respond to cyberattacks
How to apply the traditional crisis management procedure to a cyber attack? What specificities should you consider? What are the tools at your disposal?
How to prepare your crisis communication in the event of a cyberattack? Communication cycle, targets, messages: the complete guide.
Being compliant with GDPR and having efficient data protection policy is a tricky challenge that can be overcome with Cyber Risk Quantification (CRQ).
Disaster Recovery Plan (DRP)
What is the IT DRP? How to set it up to ensure disaster recovery in the event of a computer failure or a cyberattack?
DDoS attacks, or "Distributed Denial-of-Service" attacks, paralyze their victim sites. Understand how they work to protect yourself.
Malware is a cyber attack that exercises unauthorized and harmful actions on your device or system. Learn about malicious software to perfect your cyber security.
Paris, October 5th - C-Risk, has signed a partnership agreement with RiskLens, provider of the only enterprise-grade SaaS platform for CRQ using the FAIR standard.
Paris, September 30th - C-Risk, has added Normshield’s innovative cyber risk rating and quantification platform to its suite of offerings.
Business Continuity Plan (BCP): what do you need to know? How to prepare for cyberattacks and ensure the resilience of your company?
The Open Group FAIR Certification for People program is aimed at meeting the needs of risk analysts and organizations employing risk analysts.
C-Risk, the European leader in cyber risk quantification using FAIR™ announces the launch of its cyber risk quantification training program.
For a lot of industries, Business Continuity (BCP) and Disaster Recovery (DR) is a requirement; however, a lot of the time the programs are minimalistic in nature.
Risk is inherent to the enterprise world but difficult to assess and measure
The current COVID-19 context is putting enormous pressure on companywide budgets including information security.
FAIR is an analytical risk model, whereas most information security risk methodologies in use today are Capability Maturity Models (CMM) or checklists.
Showing 1 to 24 of 26 results