3rd Party Risk Management , Business Continuity Management / Disaster Recovery , Critical Infrastructure Security

Ransomware and the C-Suite: What Do Executives Want to Know?

Clar Rosso of (ISC)² on Improving Communication With Top Executives
Clar Rosso, CEO, (ISC)²

What does the C-suite want to know about its organization's ransomware preparedness and response strategies? Clar Rosso of (ISC)² shares findings from the company's new report that provides insights into the minds of C-suite executives and how they perceive their organizations’ readiness for ransomware attacks.

See Also: Gartner Guide for Digital Forensics and Incident Response

Rosso who is the CEO of (ISC)², the U.S.-based nonprofit association that offers training to cybersecurity professionals, says that executives' top concerns are verifying that their security function is working, backups are being done and restoration plans exist. They also want to know what it will take to minimally restore operations, she says.

In a video interview with Information Security Media Group, Rosso discusses:

  • Highlights from the study;
  • What the C-suite cares about regarding the potential impact of ransomware;
  • How cybersecurity leaders can better communicate the information executives need to hear.

Rosso has more than two decades of experience helping global professional associations and certifying bodies grow and strengthen member value. As CEO of (ISC)², she is responsible for the strategic direction and management of the association.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.