
Click here to access subscription content at The RTJ Bridge - The Premium Version of The RiskTech Journal
〰️
Click here to access subscription content at The RTJ Bridge - The Premium Version of The RiskTech Journal 〰️
The RiskTech Journal
The RiskTech Journal is your premier source for insights on cutting-edge risk management technologies. We deliver expert analysis, industry trends, and practical solutions to help professionals stay ahead in an ever-changing risk landscape. Join us to explore the innovations shaping the future of risk management.

From Code to Conduct: UK Cyber Mandate and Tech Disruption Signal a Governance Reckoning
Two significant announcements this week—one from the UK government and the other from Deloitte—highlight a rapidly converging future in which cybersecurity, advanced technology, and corporate governance are no longer siloed concerns but integrated imperatives for the boardroom. While distinct in origin and focus, both developments send a clear signal: the pressure on executive leaders to govern technology risks with discipline, foresight, and accountability is mounting.

When Encryption Isn't Enough—A Sidewalk Interview and a Global Wake-Up Call
I was in Washington, D.C., when the story broke. Reports surfaced that U.S. officials had used Signal—a consumer-grade encrypted messaging app—to coordinate sensitive military operations in Yemen. I was finishing a dinner meeting after a full day of engagements when my phone rang. It was the BBC reaching out for immediate commentary on a fast-developing national security story.
What Happens When Risk Protocols Fail - Lessons from the Signal App Incident
When BBC News investigated a recent national security communications breach, they reached out to Wheelhouse Advisors for expert analysis. The incident highlighted a growing risk not just for governments—but for every organization managing sensitive information in a digital world.

HIPAA 2.0 — How Risk Management Evolves Under HIPAA’s Cybersecurity Overhaul
In the face of escalating cyber threats, the U.S. healthcare sector is on the brink of its most dramatic regulatory transformation in more than a decade. The Department of Health and Human Services’ recent Notice of Proposed Rulemaking (NPRM) for the HIPAA Security Rule doesn’t just update a long-standing framework—it signals a revolutionary shift in how organizations must guard patient data. The stakes are higher than ever, with compliance costs set to soar and the consequences of non-compliance more severe than ever imagined.

Security Complexity Is Strangling Your Bottom Line—IRM Platforms Can Save It
By now, it’s obvious: complexity has become the Achilles’ heel of cybersecurity and enterprise risk management (ERM). In a recent study from the IBM Institute for Business Value—Capturing the Cybersecurity Dividend: How Security Platforms Generate Business Value—researchers found that companies juggle an average of 83 different security solutions, sourced from 29 distinct vendors. Beyond the technology overload lies a crucial lesson for risk leaders: more point solutions do not necessarily translate into better protection.

NIS2 and the Global Risk Landscape: Harnessing Integrated Risk Management to Stay Ahead
The EU’s NIS2 Directive represents a significant evolution in cybersecurity governance, and its ripple effects are set to transform compliance landscapes for companies worldwide. Despite uneven transposition across EU member states, NIS2's broader implications underscore the urgency for proactive risk management strategies. Companies can leverage Integrated Risk Management (IRM) solutions to turn these regulatory challenges into competitive advantages.

How S&P 100 Leaders Drive Cybersecurity Excellence Through Integrated Risk Management
Recent insights from the Gibson Dunn report, Cybersecurity Overview: A Survey of Form 10-K Cybersecurity Disclosures by the S&P 100 Companies, highlight key trends and practices among public companies. Integrated Risk Management (IRM) is increasingly recognized as the critical approach enabling organizations to meet these requirements while driving strategic value. In this analysis, we'll explore the evolving regulatory landscape, key trends in cybersecurity disclosures, and how IRM empowers organizations to align their cybersecurity strategies with enterprise-wide governance frameworks.

Cyber-Attacks and Corporate Ruin: The Ripple Effects Leading to Bankruptcy
In today's hyperconnected world, cyberattacks have become existential threats capable of reducing even the most established businesses to insolvency. Recent high-profile cases, such as the collapse of National Public Data and the bankruptcy of Stoli Group's U.S. subsidiaries, highlight how cyber breaches and ransomware attacks devastate systems and create cascading impacts that extend far beyond the initial compromise. These incidents serve as cautionary tales about the interconnected nature of operational, financial, and reputational risks in the digital age.

The Rising Tide of Cyber Threats: How Integrated Risk Management Can Combat AI-Driven Attacks
The cyber threat landscape is changing rapidly, with artificial intelligence (AI) serving as both a powerful tool for defense and a formidable weapon for attackers. In a recent interview with The Wall Street Journal, Amazon's Chief Information Security Officer, CJ Moses, revealed a staggering increase in daily cyber threats faced by the company. Over the past six to seven months, Amazon has witnessed an escalation from 100 million to an average of 750 million cyber-attack attempts per day. This exponential rise underscores the urgent need for organizations to implement Integrated Risk Management (IRM) strategies to protect their assets in an increasingly complex digital environment.

Cyberattack on Grocery Giant Exposes Global Risk Management Gaps
As organizations like Ahold Delhaize increasingly rely on technology for inventory management, e-commerce, and logistics, cyber disruptions can extend beyond IT systems to affect global supply chains and customer trust. This event serves as a wake-up call for businesses globally to adopt an Integrated Risk Management (IRM) approach to ensure performance, resilience, assurance, and compliance in an interconnected digital landscape.

The Exponential Growth of Cybersecurity Risks and Their Impact on Business Operations
The recent UnitedHealth hack, as detailed in a Wall Street Journal article today, serves as a stark reminder of the growing scale and severity of cybersecurity threats. UnitedHealth’s ongoing struggle with this breach reveals the broader business risks that companies face when a cyber incident occurs, particularly as the monetary and operational impacts spiral far beyond initial forecasts.

Moving Beyond a Security-Based Mindset: The Need for Integrated Disclosure and Internal Controls
In today’s interconnected and complex business environment, it is crucial for organizations to shift away from a security-based mindset that focuses narrowly on immediate threats. Instead, they must adopt an integrated risk management (IRM) approach that balances both tactical and strategic risk perspectives. Lessons learned from the SolarWinds cyberattack serve as a stark reminder of this necessity.

SEC Clarifies Cybersecurity Incident Disclosure Rules: Key Takeaways for Companies
The Securities and Exchange Commission (SEC) continues to refine its stance on the disclosure of material cybersecurity incidents, addressing corporate concerns and compliance complexities. On June 20, 2024, Erik Gerding, the Director of the SEC’s Division of Corporation Finance, provided further clarification regarding the selective disclosure of cybersecurity incidents. This move comes in response to persistent questions surrounding the SEC’s final cybersecurity disclosure rules, specifically under Item 1.05 of Form 8-K.

Understanding the New SEC Cybersecurity Incident Disclosure Rule: Trends and Implications
In the wake of increasing cybersecurity threats, the Securities and Exchange Commission (SEC) has implemented the Cybersecurity Incident Disclosure Rule, which took effect on December 18, 2023. This rule mandates publicly traded companies to disclose material cybersecurity incidents within four business days of recognizing their materiality. Here, we dissect the early trends observed since the rule's implementation and the broader implications for corporate disclosure practices.

CIRCIA’s New Rules on Critical Infrastructure: Incorporating IRM to Manage a $2.6 Billion Economic Impact
As the Cybersecurity and Infrastructure Security Agency (CISA) ushers in the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), an estimated 316,244 organizations within vital sectors stand at the cusp of significant regulatory shifts. Amidst this landscape, the strategic incorporation of Integrated Risk Management (IRM) becomes crucial not just for compliance but for bolstering cyber defenses in the face of a projected $2.6 billion economic impact over the next decade.

The Looming Shadow of the EU Cyber Resilience Act: How Integrated Risk Management Can Be Your Shield
The European Union's Cyber Resilience Act (CRA) looms large on the horizon, casting a shadow of both challenge and opportunity for companies selling software and connected devices in the EU. While the act's enforcement date is still months away, its comprehensive cybersecurity regulations demand proactive preparation from manufacturers, importers, and distributors alike.

NIST CSF 2.0: Charting Your Course with IRM Technology and IRM Navigator™
This week’s release of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 2.0 presents a significant opportunity for organizations to strengthen their cybersecurity posture. This updated framework underscores the critical role of risk management in building cyber resilience, offering valuable guidance in a rapidly evolving threat landscape. However, navigating the implementation of NIST CSF 2.0 can be challenging, often hampered by siloed data, fragmented processes, and limited visibility into overall risk exposure.

Shifting Gears: Palo Alto Networks and the Future of Cybersecurity
Palo Alto Networks is taking deliberate steps to align more closely with the burgeoning Integrated Risk Management (IRM) market in a move that signals a profound shift within the cybersecurity industry. While placing Palo Alto outside of the direct IRM market play, this strategy is symbolic of a broader industry evolution. It underscores a critical pivot towards integrating cybersecurity data feeds with IRM solutions to provide a comprehensive, business-focused risk analysis.

Latest SEC Reports Reveal Devastating Digital Risks
In an era of unpredictability and the intertwining of global digital risks, the recent cyberattacks on Clorox and Johnson Controls serve as a stark wake-up call for businesses worldwide. Currently estimated at a combined cost of $76 million, these incidents underscore the critical need for a more sophisticated, proactive approach to risk management. The just published Accenture Risk Study: 2024 Edition echoes this sentiment, revealing a concerning trend: 72% of businesses admit their risk management capabilities are lagging behind the evolving nature of threats, particularly in cybercrime.

Ticking Clock: Companies Scramble to Meet SEC Cybersecurity Rules, Audit Partners Cautious
With the December 15th deadline for the SEC's new cybersecurity risk disclosure rules rapidly approaching, companies are intensifying their preparations. The Center for Audit Quality’s (CAQ) biannual Audit Partner Pulse Survey provides valuable insights into the corporate response, especially in the context of the complex economic, political, and technological challenges businesses currently face.