🕐 --:--
-- --
عاجل
⚡ عاجل: كريستيانو رونالدو يُتوّج كأفضل لاعب كرة قدم في العالم ⚡ أخبار عاجلة تتابعونها لحظة بلحظة على خبر ⚡ تابعوا آخر المستجدات والأحداث من حول العالم
⌘K
AI مباشر
400749 مقال 248 مصدر نشط 79 قناة مباشرة 3684 خبر اليوم
آخر تحديث: منذ 0 ثانية
عاجل

Developing An Executive Cybersecurity Strategy When Director Duties Extend To The Home Router

تكنولوجيا
Forbes
2026/05/21 - 11:15 504 مشاهدة
InnovationDeveloping An Executive Cybersecurity Strategy When Director Duties Extend To The Home RouterByKeegan Crage,Forbes Councils Member.for Forbes Technology CouncilCOUNCIL POSTExpertise from Forbes Councils members, operated under license. Opinions expressed are those of the author. | Membership (fee-based)May 21, 2026, 07:15am EDTKeegan Crage | Owner, TechBrain AU — ISO 27001 certified, cyber security & AI governance partner | Oxford MSc Cyber Security (in progress). gettyThe regulatory tide has already turned. Has enterprise cyber posture kept pace?A director reviews a board pack at the kitchen table, on a personal laptop, over the home Wi-Fi. But the corporate SIEM sees nothing. The corporate SOC raises no alerts. This is the board's unowned risk, and it sits on the kitchen table. Many cyber programs built in the last decade falter at the corporate boundary. Director liability could walk out with the executive every evening.The U.S. SEC has already tightened cyber disclosure rules for companies. Australia is on the same arc, with the Corporations Act 2001 placing a statutory duty on directors to act with reasonable care and diligence. The ASIC has treated cyber as material since the Privacy Act 1988 Notifiable Data Breach Scheme can extend to director-held personal data.The enterprise security program isn't behind, but it wasn't scoped for this. The moment it clicked for me was when I found out that a chair had been using a personal Gmail account for board correspondence for the better part of two years because it was just easier on their phone. Nobody had flagged it. Nobody had even thought to look. That was the moment I realized the risk model had a human-shaped hole in it that no amount of corporate tooling was ever going to close.The Architectural Boundary​Corporate SOC, SIEM and MDR platforms are working as designed; they are staffed and tooled for the corporate-owned attack surface. But the executive's kitchen-bench laptop, the...
مشاركة:

مقالات ذات صلة

AI
يا هلا! اسألني أي شي 🎤