CROs must be part of the cybersecurity solution by david x martin

David X Martin
David X MartinFounder and CEO at David X Martin, LLC en David X Martin, LLC

Winning the battle against Cybersecurity requires the CRO to be part of the solution.

CROs Must Be Part of the Cybersecurity Solution
Winning the battle requires ERM-type oversight, ensuring that all
risks are being managed
Thursday February 09, 2017
By David X Martin
In terms of cybersecurity today, companies are fighting the good fight but losing
the battle. Chief risk officers need to become a more integral part of the solution.
Here is a plan.
Adopt a winning strategy. Most regulators take the approach of “assess the risk
and deal with it.” Most companies deal with it by trying to detect the problem
early and react to it quickly, which is not working well.
There is a better approach called Defense in Depth, which is modeled after a
conventional military strategy and has a much better chance of success. In
Defense in Depth, rather than concentrating all resources at the front line,
defenders can fall back to a series of pre-planned positions from which they can
advantageously attack the advancing enemy. Adapted to cybersecurity, Defense
in Depth strategies would use multiple security techniques and products to help
mitigate the failure of one component, while slowing down the attacker and
buying time to fix the problem.
Become intelligence-driven. The traditional approach to security relies on
prevention technologies. It treats intelligence as a product to be consumed, and
incident response as an exception-based process.
An intelligence-driven mindset is based on the assumption that you have already
been compromised and therefore need to continuously evolve and adapt to
changes in intelligence and incidents. For example, America has an intelligence-
driven model that works well for infectious diseases. Outbreaks of diseases in
foreign countries and hospitals are monitored continuously by the Centers for
Disease Control and Prevention in Atlanta. Once the disease is identified,
remedies are made available to all parties before and during an outbreak.
Treat cybersecurity as a managerial issue. Effective enterprise risk
management involves the strategic implementation of three lines of defense. As it
relates to cybersecurity, the first line of defense is the technology and operational
people who primarily address how to PREVENT incidents. The second line of
defense primarily relates to independent oversight to ensure that risks are actively
and appropriately managed.
One important approach is to use scenarios to determine the potential impact of a
cyber event. Scenarios have limitations: They only address known unknowns
(i.e., things that you can imagine) and consequently do not address the unknown
unknowns that often have to be faced in a cybersecurity event. I would suggest
an innovative approach based on what works in the manufacturing industry to
address unknown unknown risks. In cybersecurity, the second line of
defense needs to address, regardless of the cause, each interruption that can be
created by threats that may get past the first line of defense, The oversight should
assume that each critical point has been compromised, with the objective to
determine if the company can continue delivering service within certain defined
acceptable parameters. In other words, this approach focuses on the impact of
a service disruption regardless of what caused it.
To my way of thinking, it can be used to quantify the cybersecurity risk, help
prioritize Level I defenses and the commensurate budget expenditures, and better
integrate the oversight of cybersecurity with operational risk and enterprise risk
management.
Champion the next stages of innovation. The next stage of innovation in
cybersecurity needs to address three major areas of weakness, where solutions
can be accelerated:
(1) Tighter communication and collaboration between business partners and
customers will be facilitated through advances in access management/federation.
New solutions will be developed for better web access management, federated
identity, social and mobile support, application integration,
and adaptive authentication as integrated enterprises extend further beyond the
perimeter of the organization itself.
(2) Dramatic reductions in central points of failure will become possible through
new technologies that distribute data and command/control systems. Most
network architectures today have one central control system, albeit on multiple
computers/layers of computers. New technologies such as a blockchain based
communication system will allow records and data points to be kept
decentralized. Multiple control systems will require consensus mechanisms or
conditionalities, which would make them more difficult to penetrate.
(3) More rapid identification of threats and a faster and more efficient recovery
process will be facilitated using artificial intelligence. Advances in adaptive or
machine-learning algorithms have the potential to identify threats as they occur,
or to identify ever-changing ones. Intelligent security devices — i.e., bots — will
soon have the inherent ability to study patterns, then extrapolate to anticipate
future threats. Rapid responses could then be written into the DNA of companies’
networks to give an appropriate, even moment-by-moment, response if
necessary, minimizing any damage from an attack.
The best CROs are the glue that ensures that all risks are being managed. Why
not be the best?
David X Martin (dxm@cybxsecure.com) is a former chief risk officer and was
founding chair of the Investment Company Institute’s Risk Committee. He is an
adjunct professor, author, expert witness, and co-managing director
of CybX. For an earlier article published by GARP, see Risk Radar: Forward to
the Future.
David X Martin (dxm@cybxsecure.com) is a former chief risk officer and was
founding chair of the Investment Company Institute’s Risk Committee. He is an
adjunct professor, author, expert witness, and co-managing director
of CybX. For an earlier article published by GARP, see Risk Radar: Forward to
the Future.
David X Martin (dxm@cybxsecure.com) is a former chief risk officer and was
founding chair of the Investment Company Institute’s Risk Committee. He is an
adjunct professor, author, expert witness, and co-managing director
of CybX. For an earlier article published by GARP, see Risk Radar: Forward to
the Future.

Recomendados

New Risk Management Paradigm for Not-For-Profits por
New Risk Management Paradigm for Not-For-ProfitsNew Risk Management Paradigm for Not-For-Profits
New Risk Management Paradigm for Not-For-ProfitsDavid X Martin
385 vistas7 diapositivas
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec por
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecLaura Tibbo
450 vistas3 diapositivas
Energy Risk Management por
Energy Risk Management  Energy Risk Management
Energy Risk Management MetricStream Inc
403 vistas4 diapositivas
Building an Effective AML Program por
Building an Effective AML ProgramBuilding an Effective AML Program
Building an Effective AML ProgramCorporater
74 vistas5 diapositivas
Enterprise Risk Management for the Digital Transformation Age por
Enterprise Risk Management for the Digital Transformation AgeEnterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeCareer Communications Group
424 vistas15 diapositivas

Más contenido relacionado

La actualidad más candente

Enhancing Existing Risk Management in National Statistical Institutes by Usin... por
Enhancing Existing Risk Management in National Statistical Institutes by Usin...Enhancing Existing Risk Management in National Statistical Institutes by Usin...
Enhancing Existing Risk Management in National Statistical Institutes by Usin...Светла Иванова
244 vistas15 diapositivas
An Intro to Resolver's Incident Management Application por
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationResolver Inc.
322 vistas23 diapositivas
Coordinating Security Response and Crisis Management Planning por
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCognizant
2.9K vistas5 diapositivas
Risk Management Frameworks por
Risk Management FrameworksRisk Management Frameworks
Risk Management FrameworksDaniel Kapellmann Zafra
12.9K vistas7 diapositivas
Delivering stronger business security and resilience por
Delivering stronger business security and resilienceDelivering stronger business security and resilience
Delivering stronger business security and resiliencezadok001
248 vistas16 diapositivas
For Corporate Boards, a Cyber Security Top 10 por
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10David X Martin
641 vistas4 diapositivas

La actualidad más candente(20)

Enhancing Existing Risk Management in National Statistical Institutes by Usin... por Светла Иванова
Enhancing Existing Risk Management in National Statistical Institutes by Usin...Enhancing Existing Risk Management in National Statistical Institutes by Usin...
Enhancing Existing Risk Management in National Statistical Institutes by Usin...
An Intro to Resolver's Incident Management Application por Resolver Inc.
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
Resolver Inc.322 vistas
Coordinating Security Response and Crisis Management Planning por Cognizant
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management Planning
Cognizant2.9K vistas
Delivering stronger business security and resilience por zadok001
Delivering stronger business security and resilienceDelivering stronger business security and resilience
Delivering stronger business security and resilience
zadok001248 vistas
For Corporate Boards, a Cyber Security Top 10 por David X Martin
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
David X Martin641 vistas
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016 por Ben Browning
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
Ben Browning107 vistas
Common failures of risk management por Surajit Datta
Common failures of risk management   Common failures of risk management
Common failures of risk management
Surajit Datta1.6K vistas
How well are you managing risk por Gregg Barrett
How well are you managing riskHow well are you managing risk
How well are you managing risk
Gregg Barrett175 vistas
Int:rsect: CEO Address with Will Anderson por Resolver Inc.
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will Anderson
Resolver Inc.193 vistas
Integrated Security & Risk Management: Benchmarking por Resolver Inc.
Integrated Security & Risk Management: BenchmarkingIntegrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: Benchmarking
Resolver Inc.169 vistas
The Journey to Integrated Risk Management: Lessons from the Field por Resolver Inc.
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
Resolver Inc.300 vistas

Similar a CROs must be part of the cybersecurity solution by david x martin

Dynamic Vulnerability Analysis, Intrusion Detection, And... por
Dynamic Vulnerability Analysis, Intrusion Detection, And...Dynamic Vulnerability Analysis, Intrusion Detection, And...
Dynamic Vulnerability Analysis, Intrusion Detection, And...Jennifer Moser
2 vistas41 diapositivas
Avoiding The Seven Deadly Sins of IT por
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITEnvision Technology Advisors
446 vistas3 diapositivas
Symantec cyber-resilience por
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
5K vistas1 diapositiva
Incident Response por
Incident ResponseIncident Response
Incident ResponseMichaelRodriguesdosS1
437 vistas29 diapositivas
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL por
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
1.3K vistas11 diapositivas
What CIOs Need To Tell Their Boards About Cyber Security por
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
423 vistas5 diapositivas

Similar a CROs must be part of the cybersecurity solution by david x martin(20)

Dynamic Vulnerability Analysis, Intrusion Detection, And... por Jennifer Moser
Dynamic Vulnerability Analysis, Intrusion Detection, And...Dynamic Vulnerability Analysis, Intrusion Detection, And...
Dynamic Vulnerability Analysis, Intrusion Detection, And...
Jennifer Moser2 vistas
Symantec cyber-resilience por Symantec
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
Symantec5K vistas
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL por Michael Bunn
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn1.3K vistas
What CIOs Need To Tell Their Boards About Cyber Security por Karyl Scott
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott423 vistas
Exploration Draft Document- CEM Machine Learning & AI Project 2018 por Leslie McFarlin
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Leslie McFarlin225 vistas
The Custom Defense Against Targeted Attacks por Trend Micro
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
Trend Micro1K vistas
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise... por Kaspersky
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Kaspersky6.1K vistas
Ibm cognitive security_white_paper_04_2016 por Janghyuck Choi
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
Janghyuck Choi365 vistas
Darktrace_WhitePaper_EnterpriseImmuneSystem por Austin Eppstein
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
Austin Eppstein143 vistas
Five principles for improving your cyber security por WGroup
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
WGroup440 vistas
threat-lifecycle-management-whitepaper por Rudy Piekarski
threat-lifecycle-management-whitepaperthreat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaper
Rudy Piekarski244 vistas
Threat Lifecycle Management_Whitepaper por Duncan Hart
Threat Lifecycle Management_WhitepaperThreat Lifecycle Management_Whitepaper
Threat Lifecycle Management_Whitepaper
Duncan Hart132 vistas
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key... por Inno Eroraha [NetSecurity]
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Similarities And Weaknesses Of Vulnerability Scanners por Jennifer Slattery
Similarities And Weaknesses Of Vulnerability ScannersSimilarities And Weaknesses Of Vulnerability Scanners
Similarities And Weaknesses Of Vulnerability Scanners

Último

Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck por
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deckPitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deckHajeJanKamps
417 vistas18 diapositivas
NYKAA PPT .pptx por
NYKAA PPT .pptxNYKAA PPT .pptx
NYKAA PPT .pptx125071081
13 vistas9 diapositivas
Bloomerang Thank Yous Dec 2023.pdf por
Bloomerang Thank Yous Dec 2023.pdfBloomerang Thank Yous Dec 2023.pdf
Bloomerang Thank Yous Dec 2023.pdfBloomerang
93 vistas66 diapositivas
Businesses to Start in 2024.pdf por
Businesses to Start in 2024.pdfBusinesses to Start in 2024.pdf
Businesses to Start in 2024.pdfDante St James
19 vistas43 diapositivas
PMU Launch - Guaranteed Slides por
PMU Launch - Guaranteed SlidesPMU Launch - Guaranteed Slides
PMU Launch - Guaranteed Slidespmulaunch
16 vistas64 diapositivas
Tanishq por
Tanishq Tanishq
Tanishq supiriyakithuva
14 vistas7 diapositivas

Último(20)

Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck por HajeJanKamps
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deckPitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
HajeJanKamps417 vistas
NYKAA PPT .pptx por 125071081
NYKAA PPT .pptxNYKAA PPT .pptx
NYKAA PPT .pptx
12507108113 vistas
Bloomerang Thank Yous Dec 2023.pdf por Bloomerang
Bloomerang Thank Yous Dec 2023.pdfBloomerang Thank Yous Dec 2023.pdf
Bloomerang Thank Yous Dec 2023.pdf
Bloomerang93 vistas
Businesses to Start in 2024.pdf por Dante St James
Businesses to Start in 2024.pdfBusinesses to Start in 2024.pdf
Businesses to Start in 2024.pdf
Dante St James19 vistas
PMU Launch - Guaranteed Slides por pmulaunch
PMU Launch - Guaranteed SlidesPMU Launch - Guaranteed Slides
PMU Launch - Guaranteed Slides
pmulaunch16 vistas
Nevigating Sucess.pdf por TEWMAGAZINE
Nevigating Sucess.pdfNevigating Sucess.pdf
Nevigating Sucess.pdf
TEWMAGAZINE23 vistas
Top 10 Web Development Companies in California por TopCSSGallery
Top 10 Web Development Companies in CaliforniaTop 10 Web Development Companies in California
Top 10 Web Development Companies in California
TopCSSGallery44 vistas
Coomes Consulting Business Profile por Chris Coomes
Coomes Consulting Business ProfileCoomes Consulting Business Profile
Coomes Consulting Business Profile
Chris Coomes46 vistas
2023 Photo Contest.pptx por culhama
2023 Photo Contest.pptx2023 Photo Contest.pptx
2023 Photo Contest.pptx
culhama27 vistas
SUGAR cosmetics ppt por shafrinn5
SUGAR cosmetics pptSUGAR cosmetics ppt
SUGAR cosmetics ppt
shafrinn563 vistas
Building Careers at Specialty TRE 2023 por Jennifer Sanborn
Building Careers at Specialty TRE 2023Building Careers at Specialty TRE 2023
Building Careers at Specialty TRE 2023
Jennifer Sanborn45 vistas
Integrating Talent Management Practices por Seta Wicaksana
Integrating Talent Management PracticesIntegrating Talent Management Practices
Integrating Talent Management Practices
Seta Wicaksana28 vistas
Why are KPIs(key performance indicators) important? por Epixel MLM Software
Why are KPIs(key performance indicators) important? Why are KPIs(key performance indicators) important?
Why are KPIs(key performance indicators) important?
See the new MTN tariffs effected November 28, 2023 por Kweku Zurek
See the new MTN tariffs effected November 28, 2023See the new MTN tariffs effected November 28, 2023
See the new MTN tariffs effected November 28, 2023
Kweku Zurek29.4K vistas
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf por Bloomerang
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdfBloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang112 vistas

CROs must be part of the cybersecurity solution by david x martin

  • 1. CROs Must Be Part of the Cybersecurity Solution Winning the battle requires ERM-type oversight, ensuring that all risks are being managed Thursday February 09, 2017 By David X Martin In terms of cybersecurity today, companies are fighting the good fight but losing the battle. Chief risk officers need to become a more integral part of the solution. Here is a plan.
  • 2. Adopt a winning strategy. Most regulators take the approach of “assess the risk and deal with it.” Most companies deal with it by trying to detect the problem early and react to it quickly, which is not working well. There is a better approach called Defense in Depth, which is modeled after a conventional military strategy and has a much better chance of success. In Defense in Depth, rather than concentrating all resources at the front line, defenders can fall back to a series of pre-planned positions from which they can advantageously attack the advancing enemy. Adapted to cybersecurity, Defense in Depth strategies would use multiple security techniques and products to help mitigate the failure of one component, while slowing down the attacker and buying time to fix the problem. Become intelligence-driven. The traditional approach to security relies on prevention technologies. It treats intelligence as a product to be consumed, and incident response as an exception-based process. An intelligence-driven mindset is based on the assumption that you have already been compromised and therefore need to continuously evolve and adapt to changes in intelligence and incidents. For example, America has an intelligence- driven model that works well for infectious diseases. Outbreaks of diseases in foreign countries and hospitals are monitored continuously by the Centers for Disease Control and Prevention in Atlanta. Once the disease is identified, remedies are made available to all parties before and during an outbreak. Treat cybersecurity as a managerial issue. Effective enterprise risk management involves the strategic implementation of three lines of defense. As it relates to cybersecurity, the first line of defense is the technology and operational people who primarily address how to PREVENT incidents. The second line of defense primarily relates to independent oversight to ensure that risks are actively and appropriately managed. One important approach is to use scenarios to determine the potential impact of a cyber event. Scenarios have limitations: They only address known unknowns (i.e., things that you can imagine) and consequently do not address the unknown unknowns that often have to be faced in a cybersecurity event. I would suggest an innovative approach based on what works in the manufacturing industry to address unknown unknown risks. In cybersecurity, the second line of defense needs to address, regardless of the cause, each interruption that can be created by threats that may get past the first line of defense, The oversight should assume that each critical point has been compromised, with the objective to determine if the company can continue delivering service within certain defined acceptable parameters. In other words, this approach focuses on the impact of a service disruption regardless of what caused it.
  • 3. To my way of thinking, it can be used to quantify the cybersecurity risk, help prioritize Level I defenses and the commensurate budget expenditures, and better integrate the oversight of cybersecurity with operational risk and enterprise risk management. Champion the next stages of innovation. The next stage of innovation in cybersecurity needs to address three major areas of weakness, where solutions can be accelerated: (1) Tighter communication and collaboration between business partners and customers will be facilitated through advances in access management/federation. New solutions will be developed for better web access management, federated identity, social and mobile support, application integration, and adaptive authentication as integrated enterprises extend further beyond the perimeter of the organization itself. (2) Dramatic reductions in central points of failure will become possible through new technologies that distribute data and command/control systems. Most network architectures today have one central control system, albeit on multiple computers/layers of computers. New technologies such as a blockchain based communication system will allow records and data points to be kept decentralized. Multiple control systems will require consensus mechanisms or conditionalities, which would make them more difficult to penetrate. (3) More rapid identification of threats and a faster and more efficient recovery process will be facilitated using artificial intelligence. Advances in adaptive or machine-learning algorithms have the potential to identify threats as they occur, or to identify ever-changing ones. Intelligent security devices — i.e., bots — will soon have the inherent ability to study patterns, then extrapolate to anticipate future threats. Rapid responses could then be written into the DNA of companies’ networks to give an appropriate, even moment-by-moment, response if necessary, minimizing any damage from an attack. The best CROs are the glue that ensures that all risks are being managed. Why not be the best?
  • 4. David X Martin (dxm@cybxsecure.com) is a former chief risk officer and was founding chair of the Investment Company Institute’s Risk Committee. He is an adjunct professor, author, expert witness, and co-managing director of CybX. For an earlier article published by GARP, see Risk Radar: Forward to the Future. David X Martin (dxm@cybxsecure.com) is a former chief risk officer and was founding chair of the Investment Company Institute’s Risk Committee. He is an adjunct professor, author, expert witness, and co-managing director of CybX. For an earlier article published by GARP, see Risk Radar: Forward to the Future. David X Martin (dxm@cybxsecure.com) is a former chief risk officer and was founding chair of the Investment Company Institute’s Risk Committee. He is an adjunct professor, author, expert witness, and co-managing director of CybX. For an earlier article published by GARP, see Risk Radar: Forward to the Future.