Explore the many dimensions of cyber and technology risk. Cyber risk experts share valuable insights, explaining the technical aspects of cyber and technology risk. Our videos cover topics like CRQ, cybersecurity, and cyber risk insurance.
Reducing the cost of cyber incidents using risk quantification and loss chains
In this video, Tom Callaghan the co-founder of C-Risk explains how to reduce the cost of cyber incidents using risk quantification and the loss chain concept.
Rating vs Scoring vs Quantification
In this video Christophe Forêt defines and compares rating, scoring and quantification.
Risk Scenario Scoping
In this video, Tom explains what a risk scenario is and how to build a measurable risk scenario thanks to the FAIR Standard risk definition.
3 use cases for Cyber Risk Quantification
C-Risk's president and cofounder, presents 3 impactful use cases for cyber risk quantification.
Managing the risk of cloud computing
Tom explores cloud computing risk scenarios and the importance of Cyber Risk Quantification (CRQ) in safeguarding digital assets, improving time to market and maximizing ROI.
Using Value Chains to Identify Cyber Scenarios and Digital Assets
Tom Callaghan explains how C-Risk develops generic value chain models for each industry and then uses these value chains to help define an organization's risk scenarios.
Risk appetite and risk tolerance
Do you know the difference between risk appetite and risk tolerance? Tom gives explanations in this video!
Tom Callaghan, the co-founder of C-Risk lists out all the questions that the risk analyst is supposed to answer.
Cyber Risk Quantification in the context of Merger and Acquisition
Christophe Forêt, co-founder of C-Risk unveils two important questions you should answer pre- and post merger and acquisition activity.
Cyber Risk Insurance Coverage
In this video, Tom Callaghan explains how optimize or negotiate cyber risk insurance that aligns with your business needs.
Loss Chains and Kill Chains
At C-Risk, we created the Loss Chain framework, which continues the chain of events following a cyber loss event.