Click here to access subscription content at The RTJ Bridge - The Premium Version of The RiskTech Journal

〰️

Click here to access subscription content at The RTJ Bridge - The Premium Version of The RiskTech Journal 〰️

The RiskTech Journal

The RiskTech Journal is your premier source for insights on cutting-edge risk management technologies. We deliver expert analysis, industry trends, and practical solutions to help professionals stay ahead in an ever-changing risk landscape. Join us to explore the innovations shaping the future of risk management.

Where Autonomous IRM Begins—And Where It Must Go Next
Autonomous IRM, Cybersecurity, ServiceNow, Tuskira John A. Wheeler Autonomous IRM, Cybersecurity, ServiceNow, Tuskira John A. Wheeler

Where Autonomous IRM Begins—And Where It Must Go Next

The Quiet Rise of Autonomous IRM—From the Middle Out

Autonomous IRM is no longer theoretical. AI-powered platforms are starting to deliver tangible value: agentic systems that simulate attacker behavior, validate control effectiveness, and recommend mitigation actions—often autonomously.

The June 5 announcement from Tuskira, integrating directly with ServiceNow’s Vulnerability Response and SecOps modules, is a prime example. By embedding simulation-backed scoring and posture-aware mitigation into operational workflows, Tuskira is delivering intelligence in real time.

But there’s something missing: the announcement doesn’t mention Integrated Risk Management (IRM) at all.

That silence is a signal. Tuskira operates in what Wheelhouse Advisors defines as Layer 3: Intelligence & Validation—the middle of the risk architecture. And while this layer is where automation is gaining traction, it’s also where many organizations are managing in isolation, without input from either end of the enterprise risk stack.

Read More
Inside the Hack: Why Social Engineering Exposes the Limits of Cyber Defense and Demands Integrated Risk Management
Social Engineering, Cybersecurity, IRM Ori Wellington Social Engineering, Cybersecurity, IRM Ori Wellington

Inside the Hack: Why Social Engineering Exposes the Limits of Cyber Defense and Demands Integrated Risk Management

The recent cyberattack on Marks & Spencer (M&S), perpetrated by the notorious hacking group Scattered Spider, vividly underscores the evolving sophistication of cyber threats—and the alarming vulnerability of even well-protected enterprises. Despite significant investments in cybersecurity defenses, M&S faces an estimated loss of up to £300 million in operating profits and a plunge of £600 million in market capitalization following the breach.

As detailed recently by the Financial Times, Scattered Spider’s methods illuminate a stark reality: technical cybersecurity solutions alone are not enough. The group’s expertise lies in a blend of digital deception and human manipulation, a practice known as social engineering. Unlike traditional cybercriminals reliant solely on technical exploits, Scattered Spider meticulously researches employee identities, simulates convincing interactions, and leverages human psychology to circumvent cyber defenses.

Read More
Beyond the Firewall - Why Integrated Risk Management Is the Missing Layer in Cyber Defense

Beyond the Firewall - Why Integrated Risk Management Is the Missing Layer in Cyber Defense

The recent revelation that Marks & Spencer—one of Britain’s most iconic retailers—suffered a cyberattack that could cost it up to £300 million in annual operating profit is a reminder that no amount of cybersecurity spending can fully inoculate a company from human error. The attack, reportedly traced to a third-party vendor and facilitated by social engineering, underscores a hard truth: cybersecurity is necessary, but not sufficient.

Despite boosting its cyber investment by 75% and quadrupling its team over the past two years, M&S was not spared. Nor were other well-known retailers like Harrods and the Co-op grocery group. These incidents reflect a deeper problem in the digital defense playbook—one that requires a broader, integrated approach to risk.

Read More
From Code to Conduct: UK Cyber Mandate and Tech Disruption Signal a Governance Reckoning

From Code to Conduct: UK Cyber Mandate and Tech Disruption Signal a Governance Reckoning

Two significant announcements this week—one from the UK government and the other from Deloitte—highlight a rapidly converging future in which cybersecurity, advanced technology, and corporate governance are no longer siloed concerns but integrated imperatives for the boardroom. While distinct in origin and focus, both developments send a clear signal: the pressure on executive leaders to govern technology risks with discipline, foresight, and accountability is mounting.

Read More
When Encryption Isn't Enough—A Sidewalk Interview and a Global Wake-Up Call

When Encryption Isn't Enough—A Sidewalk Interview and a Global Wake-Up Call

I was in Washington, D.C., when the story broke. Reports surfaced that U.S. officials had used Signal—a consumer-grade encrypted messaging app—to coordinate sensitive military operations in Yemen. I was finishing a dinner meeting after a full day of engagements when my phone rang. It was the BBC reaching out for immediate commentary on a fast-developing national security story.

Read More
What Happens When Risk Protocols Fail - Lessons from the Signal App Incident
BBC, Secure Communications, Cybersecurity Ori Wellington BBC, Secure Communications, Cybersecurity Ori Wellington

What Happens When Risk Protocols Fail - Lessons from the Signal App Incident

When BBC News investigated a recent national security communications breach, they reached out to Wheelhouse Advisors for expert analysis. The incident highlighted a growing risk not just for governments—but for every organization managing sensitive information in a digital world.

Read More
HIPAA 2.0 — How Risk Management Evolves Under HIPAA’s Cybersecurity Overhaul
Healthcare, HIPAA, Compliance, Cybersecurity Samantha "Sam" Jones Healthcare, HIPAA, Compliance, Cybersecurity Samantha "Sam" Jones

HIPAA 2.0 — How Risk Management Evolves Under HIPAA’s Cybersecurity Overhaul

In the face of escalating cyber threats, the U.S. healthcare sector is on the brink of its most dramatic regulatory transformation in more than a decade. The Department of Health and Human Services’ recent Notice of Proposed Rulemaking (NPRM) for the HIPAA Security Rule doesn’t just update a long-standing framework—it signals a revolutionary shift in how organizations must guard patient data. The stakes are higher than ever, with compliance costs set to soar and the consequences of non-compliance more severe than ever imagined.

Read More
Security Complexity Is Strangling Your Bottom Line—IRM Platforms Can Save It

Security Complexity Is Strangling Your Bottom Line—IRM Platforms Can Save It

By now, it’s obvious: complexity has become the Achilles’ heel of cybersecurity and enterprise risk management (ERM). In a recent study from the IBM Institute for Business Value—Capturing the Cybersecurity Dividend: How Security Platforms Generate Business Value—researchers found that companies juggle an average of 83 different security solutions, sourced from 29 distinct vendors. Beyond the technology overload lies a crucial lesson for risk leaders: more point solutions do not necessarily translate into better protection.

Read More
NIS2 and the Global Risk Landscape: Harnessing Integrated Risk Management to Stay Ahead
Cybersecurity, IRM Ori Wellington Cybersecurity, IRM Ori Wellington

NIS2 and the Global Risk Landscape: Harnessing Integrated Risk Management to Stay Ahead

The EU’s NIS2 Directive represents a significant evolution in cybersecurity governance, and its ripple effects are set to transform compliance landscapes for companies worldwide. Despite uneven transposition across EU member states, NIS2's broader implications underscore the urgency for proactive risk management strategies. Companies can leverage Integrated Risk Management (IRM) solutions to turn these regulatory challenges into competitive advantages.

Read More
How S&P 100 Leaders Drive Cybersecurity Excellence Through Integrated Risk Management
Cybersecurity, IRM Ori Wellington Cybersecurity, IRM Ori Wellington

How S&P 100 Leaders Drive Cybersecurity Excellence Through Integrated Risk Management

Recent insights from the Gibson Dunn report, Cybersecurity Overview: A Survey of Form 10-K Cybersecurity Disclosures by the S&P 100 Companies, highlight key trends and practices among public companies. Integrated Risk Management (IRM) is increasingly recognized as the critical approach enabling organizations to meet these requirements while driving strategic value. In this analysis, we'll explore the evolving regulatory landscape, key trends in cybersecurity disclosures, and how IRM empowers organizations to align their cybersecurity strategies with enterprise-wide governance frameworks.

Read More
Cyber-Attacks and Corporate Ruin: The Ripple Effects Leading to Bankruptcy
Cybersecurity, Digital Risk John A. Wheeler Cybersecurity, Digital Risk John A. Wheeler

Cyber-Attacks and Corporate Ruin: The Ripple Effects Leading to Bankruptcy

In today's hyperconnected world, cyberattacks have become existential threats capable of reducing even the most established businesses to insolvency. Recent high-profile cases, such as the collapse of National Public Data and the bankruptcy of Stoli Group's U.S. subsidiaries, highlight how cyber breaches and ransomware attacks devastate systems and create cascading impacts that extend far beyond the initial compromise. These incidents serve as cautionary tales about the interconnected nature of operational, financial, and reputational risks in the digital age.

Read More
The Rising Tide of Cyber Threats: How Integrated Risk Management Can Combat AI-Driven Attacks
Artificial Intelligence, Cybersecurity Ori Wellington Artificial Intelligence, Cybersecurity Ori Wellington

The Rising Tide of Cyber Threats: How Integrated Risk Management Can Combat AI-Driven Attacks

The cyber threat landscape is changing rapidly, with artificial intelligence (AI) serving as both a powerful tool for defense and a formidable weapon for attackers. In a recent interview with The Wall Street Journal, Amazon's Chief Information Security Officer, CJ Moses, revealed a staggering increase in daily cyber threats faced by the company. Over the past six to seven months, Amazon has witnessed an escalation from 100 million to an average of 750 million cyber-attack attempts per day. This exponential rise underscores the urgent need for organizations to implement Integrated Risk Management (IRM) strategies to protect their assets in an increasingly complex digital environment.

Read More
Cyberattack on Grocery Giant Exposes Global Risk Management Gaps

Cyberattack on Grocery Giant Exposes Global Risk Management Gaps

As organizations like Ahold Delhaize increasingly rely on technology for inventory management, e-commerce, and logistics, cyber disruptions can extend beyond IT systems to affect global supply chains and customer trust. This event serves as a wake-up call for businesses globally to adopt an Integrated Risk Management (IRM) approach to ensure performance, resilience, assurance, and compliance in an interconnected digital landscape.

Read More
The Exponential Growth of Cybersecurity Risks and Their Impact on Business Operations
Cybersecurity, Healthcare Samantha "Sam" Jones Cybersecurity, Healthcare Samantha "Sam" Jones

The Exponential Growth of Cybersecurity Risks and Their Impact on Business Operations

The recent UnitedHealth hack, as detailed in a Wall Street Journal article today, serves as a stark reminder of the growing scale and severity of cybersecurity threats. UnitedHealth’s ongoing struggle with this breach reveals the broader business risks that companies face when a cyber incident occurs, particularly as the monetary and operational impacts spiral far beyond initial forecasts.

Read More
Moving Beyond a Security-Based Mindset: The Need for Integrated Disclosure and Internal Controls
Cybersecurity, Integrated Risk Management John A. Wheeler Cybersecurity, Integrated Risk Management John A. Wheeler

Moving Beyond a Security-Based Mindset: The Need for Integrated Disclosure and Internal Controls

In today’s interconnected and complex business environment, it is crucial for organizations to shift away from a security-based mindset that focuses narrowly on immediate threats. Instead, they must adopt an integrated risk management (IRM) approach that balances both tactical and strategic risk perspectives. Lessons learned from the SolarWinds cyberattack serve as a stark reminder of this necessity.

Read More
SEC Clarifies Cybersecurity Incident Disclosure Rules: Key Takeaways for Companies
Cybersecurity, Digital Risk Samantha "Sam" Jones Cybersecurity, Digital Risk Samantha "Sam" Jones

SEC Clarifies Cybersecurity Incident Disclosure Rules: Key Takeaways for Companies

The Securities and Exchange Commission (SEC) continues to refine its stance on the disclosure of material cybersecurity incidents, addressing corporate concerns and compliance complexities. On June 20, 2024, Erik Gerding, the Director of the SEC’s Division of Corporation Finance, provided further clarification regarding the selective disclosure of cybersecurity incidents. This move comes in response to persistent questions surrounding the SEC’s final cybersecurity disclosure rules, specifically under Item 1.05 of Form 8-K.

Read More
Understanding the New SEC Cybersecurity Incident Disclosure Rule: Trends and Implications

Understanding the New SEC Cybersecurity Incident Disclosure Rule: Trends and Implications

In the wake of increasing cybersecurity threats, the Securities and Exchange Commission (SEC) has implemented the Cybersecurity Incident Disclosure Rule, which took effect on December 18, 2023. This rule mandates publicly traded companies to disclose material cybersecurity incidents within four business days of recognizing their materiality. Here, we dissect the early trends observed since the rule's implementation and the broader implications for corporate disclosure practices.

Read More
CIRCIA’s New Rules on Critical Infrastructure: Incorporating IRM to Manage a $2.6 Billion Economic Impact
Cybersecurity, Integrated Risk Management John A. Wheeler Cybersecurity, Integrated Risk Management John A. Wheeler

CIRCIA’s New Rules on Critical Infrastructure: Incorporating IRM to Manage a $2.6 Billion Economic Impact

As the Cybersecurity and Infrastructure Security Agency (CISA) ushers in the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), an estimated 316,244 organizations within vital sectors stand at the cusp of significant regulatory shifts. Amidst this landscape, the strategic incorporation of Integrated Risk Management (IRM) becomes crucial not just for compliance but for bolstering cyber defenses in the face of a projected $2.6 billion economic impact over the next decade.

Read More
The Looming Shadow of the EU Cyber Resilience Act: How Integrated Risk Management Can Be Your Shield

The Looming Shadow of the EU Cyber Resilience Act: How Integrated Risk Management Can Be Your Shield

The European Union's Cyber Resilience Act (CRA) looms large on the horizon, casting a shadow of both challenge and opportunity for companies selling software and connected devices in the EU. While the act's enforcement date is still months away, its comprehensive cybersecurity regulations demand proactive preparation from manufacturers, importers, and distributors alike.

Read More
NIST CSF 2.0: Charting Your Course with IRM Technology and IRM Navigator™
Cybersecurity, Integrated Risk Management Wheelhouse Advisors Cybersecurity, Integrated Risk Management Wheelhouse Advisors

NIST CSF 2.0: Charting Your Course with IRM Technology and IRM Navigator™

This week’s release of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 2.0 presents a significant opportunity for organizations to strengthen their cybersecurity posture. This updated framework underscores the critical role of risk management in building cyber resilience, offering valuable guidance in a rapidly evolving threat landscape. However, navigating the implementation of NIST CSF 2.0 can be challenging, often hampered by siloed data, fragmented processes, and limited visibility into overall risk exposure.

Read More