Open Menu Close Menu
CFO
  • News
  • Resources
  • Webinars
  • CFO Magazine
  • Newsletter
Search

Mary A. Chaput

Using Captives For Cyber Risk Management

If public insurance companies are finding it hard to underwrite cyber policies, how can a corporate-owned captive do it?

Hackers Are the Problem, Workers the Weak Point

It only takes one employee clicking on the wrong link to give away the keys to the kingdom.

Don’t Overlook Data Security Issues In M&A Deals

How to assess whether your acquisition target is prepared to deal with and defend against a data breach.

How to Prevent Data Breaches by Service Providers

Here are some practical ways to improve providers' data-security efforts.

6 Ways to Combat Internal Threats to Data Security

Companies can cut down on the number of data breaches attributable to employee error or fraudulent behavior.

8 Steps to Stronger Information Risk Management

How can CFOs balance the risk/reward equation to spark CEOs' interest in information risk management decisions?

Calculating the Colossal Cost of a Data Breach

Some targets have spent tens of millions just to notify customers and provide identity-theft monitoring.

CFO Follow us on social media
LinkedIn Facebook Twitter YouTube

Topics

  • Accounting & Tax
  • Credit & Capital
  • Risk & Compliance
  • Strategy
  • Technology
  • Human Capital

Content

  • Homepage
  • News
  • Resources
  • Webinars
  • CFO Magazine

About CFO

  • About CFO
  • Privacy Policy
  • Editorial Staff
  • Press
  • Advertise
  • Contact Us

Stay Updated

Sign up to receive the CFO newsletter.

Copyright © 2021 CFO. Industry Dive, Inc. (c) 2021, All rights reserved, 1255 23rd Street, NW, Suite 550, Washington, DC 20037

We use cookies to optimize your experience on our website and for analytics and advertising purposes. By continuing to use our site, you agree to our cookie policy. Learn more