How do we measure cyber risk?
All organizations know they should be taking steps to mitigate cyber attacks, but establishing a plan can be difficult


Deborah has over twenty years’ experience in information security, working with many sectors to understand the challenges they face with security and operating their business. She started her career in electronic engineering in the aerospace industry and moved into security, evaluating secure products before developing the first BSI course on Information Security Management Systems, previously BS7799, now ISO27001.
Cyber security has grown from a preoccupation of the IT department alone to something that can also keep CFOs, CEOs and others in the boardroom up at night.
There was once a time when a computer virus might have been seen as an annoyance or inconvenience that was contained to at most a handful of computers. Now, however, most companies – and would-be attackers – realize a successful ransomware campaign, for example, could bring down their business.
In this special edition of the ITPro Podcast, in association with BT, Rory and Jane are joined by Deborah Moir, principal cyber security consultant at BT. Together, they discuss the risks businesses face and how they can quantify them to decide where to concentrate their defense resources.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
April rundown: MITRE frights and Microsoft launches Recall (again)
ITPro Podcast As CISA delivered an eleventh-hour reprieve for the CVE database, AWS reportedly began to pause some data center leases
By Rory Bathgate
-
Hackers are duping developers with malware-laden coding challenges
News A North Korean state-sponsored group has been targeting crypto developers through fake coding challenges given as part of the recruitment process.
By Emma Woollacott
-
A ‘significant increase’ in infostealer malware attacks left 3.9 billion credentials exposed to cyber criminals last year – and experts worry this is a ticking time bomb for enterprises
News The threat of infostealer malware is on the rise, with 4.3 million machines infected last year alone
By Solomon Klappholz
-
The new era of cyber threats
ITPro Podcast With AI-powered attacks and state-backed groups, security teams face face a new wave of sophisticated threats
By Rory Bathgate
-
Insurance sector urged to sharpen up third-party risk management as attacks surge
News More than half of data breaches in the insurance sector last year were due to third-party security incidents, new research shows.
By Emma Woollacott
-
Compliant security with CDW
whitepaper Maximising the value of technology in an evolving defence sector
By ITPro
-
Protect your organization with Microsoft 365
whitepaper Maximising the value of technology in an evolving defence sector
By ITPro
-
Integrating Copilot With CDW
whitepaper Maximising the value of technology in an evolving defence sector
By ITPro