How do we measure cyber risk?
All organizations know they should be taking steps to mitigate cyber attacks, but establishing a plan can be difficult


Deborah has over twenty years’ experience in information security, working with many sectors to understand the challenges they face with security and operating their business.
She started her career in electronic engineering in the aerospace industry and moved into security, evaluating secure products before developing the first BSI course on Information Security Management Systems, previously BS7799, now ISO27001.
Cyber security has grown from a preoccupation of the IT department alone to something that can also keep CFOs, CEOs and others in the boardroom up at night.
There was once a time when a computer virus might have been seen as an annoyance or inconvenience that was contained to at most a handful of computers. Now, however, most companies – and would-be attackers – realize a successful ransomware campaign, for example, could bring down their business.
In this special edition of the ITPro Podcast, in association with BT, Rory and Jane are joined by Deborah Moir, principal cyber security consultant at BT. Together, they discuss the risks businesses face and how they can quantify them to decide where to concentrate their defense resources.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Researchers sound alarm over AI hardware vulnerabilities that expose training data
News Hackers can abuse flaws in AI accelerators to break AI privacy – and a reliable fix could be years away
-
Are AI PCs becoming the norm?
ITPro Podcast As manufacturers increasingly embed NPUs in devices, what are the benefits to businesses?
-
Getting a grip on digital identity
ITPro Podcast As AI agent adoption explodes, security leaders will need better identity controls than ever before
-
Let’s talk about digital sovereignty
In the age of AI and cloud, where data resides is a key consideration
-
Can cyber group takedowns last?
ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
-
July rundown: Salt Typhoon and SharePoint scares
ITPro Podcast US public sector organizations are under serious threat from the state-backed hacking group
-
Can the UK ban ransomware payments?
ITPro Podcast Attempts to cut off ransomware group profits could instead harm businesses
-
We need to talk about operational technology
ITPro Podcast Groups like Volt Typhoon are abusing poor hygiene in critical infrastructure to pre-position for attacks
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
April rundown: MITRE frights and Microsoft launches Recall (again)
ITPro Podcast As CISA delivered an eleventh-hour reprieve for the CVE database, AWS reportedly began to pause some data center leases