Insights

What Happens When Prevention Fails, & Cyber Resilience Takes Over

For years, cybersecurity has been treated like a home alarm system. You install it, arm it, and hope it only goes off when something truly bad happens. The problem is that modern cyber threats no longer behave like burglars rattling windows at night. They act more like termites, quietly weakening structures over time, or like flash floods that overwhelm defenses faster than alarms can react. In this environment, reacting after the fact is no longer enough. Organizations must move from reactive cybersecurity to proactive cyber resilience.

The Problem With Risk Registers in Modern ERM

In my latest post, I discuss how if you look at how enterprise risk management is practiced today, you’d be forgiven for thinking that the entity-level risk register sits at the center of ISO 31000 and COSO ERM. It doesn’t.

AI Operational Risk Across the ML Lifecycle

Managing risks across the AI/ML lifecycle is critical for building reliable, secure, and ethical models. From data collection and labeling to training, fine-tuning, and evaluation, each stage presents unique challenges that can affect performance, reproducibility, fairness, and safety. Implementing well-defined controls ensures models are trustworthy, auditable, and resilient to both technical and operational issues. 

From Experiment to Ecosystem: What GRC Report’s Growth Says About the State of GRC

There’s a certain kind of growth story you see all the time in digital media. Big launches. Loud claims. Paid distribution quietly doing most of the work behind the scenes. This isn’t that story. What started as a small, independent experiment has, in a remarkably short period of time, turned into something far more consequential: a place where governance, risk, and compliance professionals actually come back, not because they’re chased by algorithms, but because the content respects their time and intelligence.

Beyond Visibility: From Risk Awareness to Enterprise Risk Intelligence in Practice

In my earlier reflections on enterprise risk intelligence, I focused on a fundamental realization: the world organizations now operate in no longer matches the way risk has traditionally been framed, assessed, or governed. That observation has continued to stay with me, not as an abstract idea, but as something I see play out repeatedly in conversations with boards, executives, and risk leaders across industries.

Performing a Risk-Based Cyber Audit

In his latest article, Norman Marks challenges a familiar reflex in internal audit: treating cybersecurity as a standalone auditable domain. Drawing on the IIA’s Cybersecurity Topical Requirement and his own experience as a chief audit executive, Marks makes the case for a more disciplined, risk-based approach—one that looks past controls and frameworks to assess how management actually identifies and manages cyber-related business risk. The result is a practical rethink of how cyber fits into an audit plan, and why auditing “cybersecurity” itself may miss what really matters.

The Governance Problem Hidden Inside Modern Hiring

There is a growing problem in how applicant tracking systems are being used in hiring, and it is one that deserves more honest scrutiny. Too often, ATS platforms are treated as decision engines rather than what they actually are: administrative tools designed to support process, not replace judgment.