<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cyber Navigator]]></title><description><![CDATA[Guiding CISOs and business leaders to secure trust, reputation, and business success through smarter cybersecurity programs and strategies.]]></description><link>https://www.cybernavigator.org</link><image><url>https://substackcdn.com/image/fetch/$s_!W8tE!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483fa541-52f9-4a50-b4b9-aa36465512eb_1280x1280.png</url><title>The Cyber Navigator</title><link>https://www.cybernavigator.org</link></image><generator>Substack</generator><lastBuildDate>Wed, 29 Apr 2026 04:16:16 GMT</lastBuildDate><atom:link href="https://www.cybernavigator.org/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Tobias Faiss]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cs-navigator@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cs-navigator@substack.com]]></itunes:email><itunes:name><![CDATA[Tobias Faiss]]></itunes:name></itunes:owner><itunes:author><![CDATA[Tobias Faiss]]></itunes:author><googleplay:owner><![CDATA[cs-navigator@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cs-navigator@substack.com]]></googleplay:email><googleplay:author><![CDATA[Tobias Faiss]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Agentic AI at work]]></title><description><![CDATA[Where enterprise value is real - and where autonomy becomes risk]]></description><link>https://www.cybernavigator.org/p/agentic-ai-at-work</link><guid isPermaLink="false">https://www.cybernavigator.org/p/agentic-ai-at-work</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Mon, 30 Mar 2026 04:43:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3Njk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3Njk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3Njk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!3Njk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!3Njk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!3Njk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3Njk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:924025,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/192360054?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3Njk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!3Njk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!3Njk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!3Njk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cfed1bc-acf6-4a8e-a04e-f7f4d145cfea_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">With great power comes great responsibility (AI generated image)</figcaption></figure></div><p>An agentic AI system does more than generate text. It can plan, decide, and act across multiple steps using tools, data sources, workflows, and sometimes other agents. In enterprise terms, this means the system can move from &#8220;answering a question&#8221; to executing work.</p><p>A simple way to think about agentic AI is:</p><ul><li><p>Brain: The model that reasons or generates response.</p></li><li><p>Context: The instructions, memory, and data it uses</p></li><li><p>Tools: The systems it can access to take action</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vMDH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vMDH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png 424w, https://substackcdn.com/image/fetch/$s_!vMDH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png 848w, https://substackcdn.com/image/fetch/$s_!vMDH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png 1272w, https://substackcdn.com/image/fetch/$s_!vMDH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vMDH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png" width="1363" height="717" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/adb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:717,&quot;width&quot;:1363,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:649855,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/192360054?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vMDH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png 424w, https://substackcdn.com/image/fetch/$s_!vMDH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png 848w, https://substackcdn.com/image/fetch/$s_!vMDH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png 1272w, https://substackcdn.com/image/fetch/$s_!vMDH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadb33e00-e4f0-46f2-a101-c293c2ff040f_1363x717.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul><p>That distinction matters because the main risk is no longer just inaccurate output like we have seen it in the last couple of years due to non-deterministic system behavior. </p><p>The bigger issue is unsafe or uncontrolled action.</p><h2>Where agentic AI makes sense</h2><p>While the industry is telling you it is the next big thing of operational efficiency, Agentic AI is most useful when work is:</p><ul><li><p>multi-step, not one-shot</p></li><li><p>repetitive but not highly judgment-sensitive</p></li><li><p>tool-enabled, but within clear limits</p></li><li><p>bounded in scope</p></li><li><p>easy to supervise, interrupt, or reverse</p></li></ul><h2>Agentic AI use cases in an enterprise</h2><p>These are typically the most effective starting points: Summarizing emails, documents, tickets, or meetings; researching approved internal knowledge sources; drafting reports, RFP responses, or internal communications; gathering information across systems for analysts; triaging support requests before human review; and coordinating routine workflow steps across approved tools. </p><p>These use cases tend to perform well because the impact of failure remains limited, and actions can usually be reviewed, validated, or reversed if necessary.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Where agentic AI is higher risk</h2><p>Risk rises sharply when an agent can take actions that are privileged, external, irreversible, or difficult to detect quickly. High-risk situations include moving money or issuing refunds, approving transactions or business decisions, modifying authoritative records in ERP, HR, finance, or CRM systems, sending messages as a trusted employee or executive, changing access rights or interacting with IAM or PAM systems, executing code, scripts, database commands, or infrastructure changes, browsing untrusted websites or using unvetted third-party tools, and making decisions that affect customers, employees, or regulated outcomes. </p><p>In these cases, the issue extends beyond model quality. The real risk comes from the combination of autonomy, tool access, and business impact. To identify areas of high risk, I recommend to look into the EU AI Act <a href="https://ai-act-service-desk.ec.europa.eu/en/ai-act/annex-3">Annex III</a> to source an extensive list of what is being considered as high-risk AI system.</p><p>Another rule of thumb for daily operations is that an AI agent becomes materially more dangerous when it is connected to: Payment or treasury systems; ERP, HR, CRM, or ticketing systems with write access; email or collaboration tools with send/delete capability; admin consoles or privileged APIs shells, Python, PowerShell, CI/CD pipelines, or database tools; browsers operating in authenticated sessions; external plugins, connectors, MCP servers, or other agent-to-agent interfaces.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3gRA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3gRA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3gRA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3gRA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3gRA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3gRA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg" width="1456" height="919" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:919,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:196132,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/192360054?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3gRA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3gRA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3gRA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3gRA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dadbb61-345a-4278-bd88-8e2d62c3ded9_2240x1414.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A read-only assistant is very different from an agent that can send, change, approve, execute, or delete.</p><p>To sum it up, the most practical rule of thumb is the following:</p><p>Use &#8216;classic&#8217; GenAI or (even Machine Learning) when:</p><ul><li><p>the task is one-shot</p></li><li><p>no tools are needed</p></li><li><p>the output is advisory only</p></li><li><p>a human will perform the actual action</p></li></ul><p>Use a bounded agent when:</p><ul><li><p>the task requires several steps</p></li><li><p>only a small, approved toolset is needed</p></li><li><p>the work is narrow and reversible</p></li><li><p>there is clear ownership and monitoring</p></li></ul><p>Use a tightly governed agent with human approval when:</p><ul><li><p>money, legal exposure, customer outcomes, regulated data, or critical operations are involved</p></li><li><p>rollback is difficult</p></li><li><p>misuse could create material business harm</p></li></ul><p>So, can these guardrails be narrowed down into basic principles? </p><p>Yes, of course.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4OzW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4OzW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4OzW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4OzW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4OzW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4OzW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg" width="1456" height="679" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:679,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:189324,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/192360054?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4OzW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4OzW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4OzW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4OzW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61bf1c81-3602-470b-bede-9ec760bccfe3_2495x1164.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Agentic AI usually makes sense when three factors stay controlled:</p><ol><li><p>Agency: How autonomous is the system?</p></li><li><p>Impact: What happens if it gets it wrong?</p></li><li><p>Complexity: How many steps, tools, and dependencies are involved?</p></li></ol><p>The higher these go, the stronger the controls and guardrails must be.</p><h2>How to implement Agentic AI safely in an enterprise </h2><p>Begin by creating a clear inventory of all agents, documenting each agent&#8217;s purpose, ownership, underlying model, data access, available tools, and assigned risk rating. From there, classify the tools those agents can use according to their level of risk, distinguishing between read-only capabilities and those that can write, approve, or execute actions. Apply the principles of least privilege and least agency by limiting each agent&#8217;s permissions and autonomy to only what is strictly necessary for its role. Introduce human approval at critical control points, ensuring that any high-impact action is reviewed before execution. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ny-f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ny-f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ny-f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ny-f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ny-f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ny-f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg" width="1302" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1302,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:114563,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/192360054?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ny-f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ny-f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ny-f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ny-f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfcbb950-ece4-4ead-bfe2-c40e1445b733_1302x1456.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Strengthen identity management by treating agents as non-human identities with unique credentials that can be quickly revoked if needed. Maintain comprehensive monitoring and logging of all agent activity, including tool usage, goal changes, privilege escalation, and any unusual behavior. Finally, operate with the assumption that all connected content, whether from web pages, documents, emails, APIs, or even other agents, may be malicious and design safeguards accordingly.</p><h2>The bottom line</h2><p>Agentic AI works best when it acts like a well-supervised junior operator: Focused mission, approved tools, visible activity, and easy human intervention.</p><p>It becomes risky when it acts like an unsupervised privileged employee: Broad permissions, external connectivity, code execution, money movement, or decisions affecting people. </p><p>Use agents for coordination, preparation, and controlled execution. Use humans for approval, exceptions, and irreversible actions - and your chances of applying Agentic AI successfully will rise significantly.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#011 - Why AI and cyber risk now belong in the boardroom]]></title><description><![CDATA[The risk leaders still underprice in cyber and artificial intelligence]]></description><link>https://www.cybernavigator.org/p/011-why-ai-and-cyber-risk-now-belong</link><guid isPermaLink="false">https://www.cybernavigator.org/p/011-why-ai-and-cyber-risk-now-belong</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Sun, 29 Mar 2026 06:01:06 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/191376243/cb443913ddf327926aea135274eb0456.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Cyber and AI risk have become boardroom issues with direct consequences for growth, resilience, and enterprise value. In this episode, senior leaders and investors will hear a sharp discussion on why these risks demand stronger governance, clearer accountability, and better executive judgment.</p><p>The episode unpacks how cyber and AI exposure shape strategic&#8230;</p>
      <p>
          <a href="https://www.cybernavigator.org/p/011-why-ai-and-cyber-risk-now-belong">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Real Agentic AI Risk Is Authority, Not Output]]></title><description><![CDATA[Enterprise AI risk is shifting from flawed answers to flawed actions taken with legitimate access.]]></description><link>https://www.cybernavigator.org/p/the-real-agentic-ai-risk-is-authority</link><guid isPermaLink="false">https://www.cybernavigator.org/p/the-real-agentic-ai-risk-is-authority</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Sun, 22 Mar 2026 07:02:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XeeJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XeeJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XeeJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png 424w, https://substackcdn.com/image/fetch/$s_!XeeJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png 848w, https://substackcdn.com/image/fetch/$s_!XeeJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png 1272w, https://substackcdn.com/image/fetch/$s_!XeeJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XeeJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png" width="1280" height="860" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:860,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:999394,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/191283034?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XeeJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png 424w, https://substackcdn.com/image/fetch/$s_!XeeJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png 848w, https://substackcdn.com/image/fetch/$s_!XeeJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png 1272w, https://substackcdn.com/image/fetch/$s_!XeeJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5ce8f16-e87e-4541-82a5-31346e44bf95_1280x860.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">When AI agents go rogue, resilience matters (AI generated image)</figcaption></figure></div><p>The next serious AI failure in business is unlikely to come from a model producing a flawed paragraph. It is more likely to come from an AI agent with access to messaging channels, external tools, persistent sessions, and live workflows taking the wrong action with valid credentials. OpenClaw makes that shift easier to see because it is built as a self-hosted, always-available assistant that connects to multiple chat platforms and supports tool use inside those environments. That makes it a useful signal of where enterprise AI is heading: Away from content generation and toward delegated action.</p><h2>A category shift is now visible</h2><p>Many leadership teams still evaluate AI through the lens of model quality. They ask whether the model is accurate, fast, helpful, and safe enough for drafting, summarization, and decision support. Those questions remain relevant. They no longer capture the full business risk.</p><p>A different class of AI is now emerging. OpenClaw is described as a personal AI assistant that runs across messaging apps, remains persistently available, and can use tools to complete tasks. Its documentation emphasizes multi-channel access, sessions, routing, media support, and configurable tool permissions. Those features move AI closer to an operating layer inside day-to-day work.</p><p>That matters because the economics improve as AI moves closer to execution. A system that can monitor communication flows, retrieve context, coordinate tasks, and trigger actions offers more than convenience. It offers cycle-time compression, lower coordination cost, and a new form of operating leverage. That is why agentic systems are drawing attention from boards, executive teams, and investors.</p><p>It also changes the risk equation. </p><p>When AI can act inside live workflows, the central question is no longer whether the system sounds intelligent. The question is whether the enterprise has delegated authority it cannot yet govern with confidence.</p><h2>Permission is becoming the defining risk variable</h2><p>Traditional AI creates output risk. It can misstate facts, miss nuance, or produce poor analysis. Agentic AI creates authority risk.</p><p>That distinction has direct strategic significance. A flawed summary can usually be reviewed and corrected. An agent that reads a message, interprets context, accesses a tool, and initiates an action can create operational, legal, and reputational consequences before anyone notices the chain of events.</p><p>This is where many organizations remain underprepared. Once a system can ingest external content, maintain persistent presence across channels, and use tools with real permissions, the control problem becomes sharper. The issue shifts from model performance to authority design. Who approved the access model? Which actions require human intervention? What evidence exists that activity can be supervised, reconstructed, and contained?</p><p>Those are governance questions. They sit squarely in the domain of executive accountability.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/p/the-real-agentic-ai-risk-is-authority?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Cyber Navigator! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/p/the-real-agentic-ai-risk-is-authority?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybernavigator.org/p/the-real-agentic-ai-risk-is-authority?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p>Tools like OpenClaw are relevant because they make the access problem tangible. Its architecture and tooling show how quickly AI can move into messaging environments, connected services, and persistent workflows. The strategic implication reaches far beyond one project. Enterprises are entering an era in which AI systems will receive access before most control frameworks have matured enough to manage that access safely.</p><h2>The upside will be real and the downside will be expensive</h2><p>The commercial case for Agentic AI is easy to understand. Businesses want less friction in execution. They want fewer manual handoffs, faster internal response, and better use of scarce management time. Systems that can sit inside communication channels and coordinate routine activity promise measurable productivity gains.</p><p>That creates value in three places.</p><p>For enterprises, Agentic AI can reduce coordination drag in functions where delay compounds cost. For software vendors, it creates a path from commodity model access toward higher-value workflow integration. For investors, it opens a more durable competitive question: which companies can convert AI capability into trusted enterprise deployment.</p><p>That final point will drive valuation outcomes.</p><p>The market will reward governable autonomy. Buyers will pay for systems that can be bounded, supervised, logged, and constrained with clarity. They will hesitate when a product appears powerful but cannot satisfy internal controls, legal review, cyber underwriting questions, or regulated deployment requirements.</p><p>This is where early enthusiasm and durable enterprise value begin to diverge. Capability attracts attention: Control sustains revenue.</p><p>In practical terms, trust architecture is becoming part of the product. Vendors that treat identity, permissions, auditability, and containment as first-order product features will be better positioned for core enterprise adoption. Vendors that treat those issues as secondary may still generate pilot activity and user enthusiasm, but they will face slower expansion, harder procurement cycles, and weaker long-term monetization.</p><p></p><h2>This is now a boardroom and investment issue</h2><p>Boards should view Agentic AI as a governance matter with clear oversight implications. Once systems can act across communications and workflows, the board&#8217;s questions become more exacting. What authority has been delegated? Where are the approval boundaries? How is management testing that those boundaries hold under pressure? What evidence supports confidence in supervision and escalation?</p><p>CEOs should view this as an operating model decision. The pressure to deploy Agentic AI will come from productivity goals, competitive signaling, and internal momentum. That pressure can create hidden exposure when leadership treats delegated action as a software feature instead of an enterprise authority model.</p><p>CFOs should view this through the lens of risk-adjusted returns. The upside includes labor leverage and faster execution. The downside includes incident cost, control remediation, legal review, vendor diligence, insurance friction, and delayed scaling. Capital allocation discipline matters most when upside is visible and downside remains underpriced.</p><p>Investors should pay close attention to the difference between autonomous capability and commercially deployable autonomy. Open ecosystems and open-source momentum can accelerate experimentation. Enduring enterprise value will accrue to platforms that can convert flexibility into trust, and trust into repeatable adoption.</p><p>That is where category leaders will separate from high-visibility followers.</p><h2>The leadership framework is simple</h2><p>The most useful way to assess Agentic AI is through three executive questions.</p><ol><li><p><strong>Authority:</strong> What can the system access, approve, trigger, or change?</p></li><li><p><strong>Exposure:</strong> What messages, files, external content, or third-party inputs can influence its behavior?</p></li><li><p><strong>Containment:</strong> What mechanisms can limit, supervise, reverse, and investigate its actions?</p></li></ol><p>This framing improves the quality of decision-making quickly. It helps leadership distinguish between acceptable low-authority use cases and deployments that create enterprise-level exposure. It clarifies where hard permission boundaries are required. It forces management to define where AI can assist, where it can act under constraint, and where human approval remains mandatory.</p><div><hr></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d66da469-b888-450d-8f8c-11d939062aac&quot;,&quot;caption&quot;:&quot;In this episode, we examine Shopify CEO Tobi L&#252;tke&#8217;s bold directive that redefines how teams operate across the company. Employees must now prove why AI cannot perform a task before hiring or requesting additional resources. This move positions artificial intelligence as a default tool in workflows, not an optional enhancement.&quot;,&quot;cta&quot;:&quot;Listen now&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;md&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;#005 - AI First, Humans Second? Shopify Thinks So...&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:17167993,&quot;name&quot;:&quot;Tobias Faiss&quot;,&quot;bio&quot;:&quot;Guiding business leaders to secure trust and their reputation through smarter cybersecurity programs and strategies.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/98cab5f9-b1b7-49d7-b1ad-966c328d1c66_2048x1664.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-05-06T04:00:36.320Z&quot;,&quot;cover_image&quot;:&quot;https://substack-video.s3.amazonaws.com/video_upload/post/161531259/12839a70-c447-4b3d-a3a9-ad3841dbabd3/transcoded-1744891610.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cybernavigator.org/p/005-ai-first-humans-second-shopify&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:161531259,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:2053381,&quot;publication_name&quot;:&quot;The Cyber Navigator&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!W8tE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F483fa541-52f9-4a50-b4b9-aa36465512eb_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><p>Disciplined adopters will gain advantage here. They will move quickly in low-authority environments, impose tighter controls where business consequences rise, and scale only when auditability and containment are credible. That is how organizations capture operating leverage without accumulating hidden liability.</p><h2>The real signal is broader than OpenClaw</h2><p>OpenClaw matters because it makes the next phase of AI visible. It shows how fast the market is moving toward persistent, tool-using, multi-channel agents that can do work inside the flow of business.</p><p>That is the real strategic story.</p><p>The center of AI risk has moved from generated content to delegated authority. That is where cyber risk, governance, operational resilience, and valuation now converge. Leadership teams that recognize this early will make better decisions about deployment, control design, vendor selection, and capital commitment.</p><p>The firms that create lasting value in this phase of AI will be the ones that govern permission with discipline. That will matter more than raw autonomy. It will matter more than product theater. It will matter more than model prestige.</p><p>In enterprise AI, enduring advantage will come from control over what the system is allowed to do.</p>]]></content:encoded></item><item><title><![CDATA[The Iran-Linked Stryker Cyberattack: When Cyber Risk Becomes an Operational Shutdown]]></title><description><![CDATA[What the Iran-linked cyberattack on Stryker reveals about operational cyber risk - and the lessons every CISO should take away.]]></description><link>https://www.cybernavigator.org/p/the-iran-linked-stryker-cyberattack</link><guid isPermaLink="false">https://www.cybernavigator.org/p/the-iran-linked-stryker-cyberattack</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Fri, 13 Mar 2026 13:53:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!shik!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!shik!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!shik!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png 424w, https://substackcdn.com/image/fetch/$s_!shik!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png 848w, https://substackcdn.com/image/fetch/$s_!shik!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png 1272w, https://substackcdn.com/image/fetch/$s_!shik!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!shik!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png" width="1280" height="860" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:860,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:218745,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/190833333?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!shik!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png 424w, https://substackcdn.com/image/fetch/$s_!shik!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png 848w, https://substackcdn.com/image/fetch/$s_!shik!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png 1272w, https://substackcdn.com/image/fetch/$s_!shik!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8129bae1-483a-4de1-91a2-bde13db8cea7_1280x860.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">When attackers seize control systems, they can shut down the business. (AI generated image).</figcaption></figure></div><p>The recent cyberattack on Stryker deserves attention well beyond the security community. This was not simply another breach, and it does not fit neatly into the familiar ransomware narrative. It appears to have been a destructive attack with immediate operational consequences for a major global medical technology company.</p><p>Stryker disclosed on March 11, 2026 that it had experienced a cyberattack affecting portions of its network. By March 12, the company said the incident was disrupting order processing, manufacturing, and shipping, even as patient-related services and connected medical devices were reported as unaffected. Those facts alone make this a significant event. A cyber incident that interrupts core business operations at scale is no longer an IT matter. </p><p>It becomes an enterprise resilience issue.</p><p>Public reporting has linked the incident to Handala, a group widely described as Iran-linked. The wider geopolitical setting matters here. This incident is being reported not as ordinary criminal activity motivated by financial gain, but as part of a broader pattern of politically motivated cyber aggression tied to current regional conflict. That should change how boards interpret the event. It sits closer to sabotage than extortion.</p><p>The technical lesson is as important as the geopolitical one. Early reporting indicates that this may have involved the abuse of enterprise management capability to disable or wipe systems at scale, rather than the deployment of conventional ransomware. Reuters reported that no ransomware was detected. Security reporting has pointed to the possible use of trusted administrative mechanisms to create enterprise-wide disruption. That distinction is critical. When attackers gain control of identity systems, endpoint management, or remote administration tooling, they may not need malware to cause major damage. They can use legitimate control planes to execute destructive actions quickly and broadly.</p><p>That changes the board conversation.</p><p>For years, many organizations have centered their preparedness around theft of data and encryption of systems. Those remain serious risks, but they are no longer the full picture. The more consequential question is whether an attacker can take over the mechanisms the company itself uses to manage trust, configure devices, and operate at scale. If the answer is yes, then the organization may face a rapid loss of operational control, not just a compromise of confidentiality.</p><p>That appears to be the central issue in the Stryker case. The disruption quickly affected the company&#8217;s ability to process orders, support manufacturing, and move product. That is a direct line from cyber compromise to business interruption. For a company serving healthcare markets, the stakes are especially high because operational disruption can affect customers, partners, supply chains, and public confidence all at once. Reuters also reported a negative market reaction after the incident became public.</p><p>There is also a sector-specific lesson. Medical technology and healthcare organizations occupy an uncomfortable position in the threat landscape. They are commercially important, operationally complex, highly connected, and close to services that society depends on. That makes them attractive targets for state-linked actors seeking leverage and visibility. AP has reported warnings from officials and researchers about wider Iranian cyber activity directed at American and other targets during the current conflict. Leaders in healthcare, industrial sectors, logistics, and other strategically important industries should assume that this risk is relevant to them.</p><p>Boards should take three messages from this incident.</p><ul><li><p>First, destructive cyber risk is now a mainstream corporate risk. It is no longer confined to governments or critical national infrastructure.</p></li><li><p>Second, trusted enterprise control systems have become prime targets. Identity platforms, device management tooling, endpoint administration, and remote access systems now sit much closer to the center of enterprise risk than many governance models still reflect.</p></li><li><p>Third, resilience must be tested against loss of control, not just loss of data. It is not enough to ask whether backups exist. The more important question is whether the organization can recover safely and at scale if the normal administrative plane has been compromised and cannot be trusted.</p></li></ul><p>That leads to a better set of board questions. Are high-impact administrative actions tightly restricted and independently monitored? Are destructive functions such as remote wipe or mass reconfiguration subject to stronger safeguards? Can the company rebuild endpoints and servers without depending on the same control systems that may have been used in the attack? Has management exercised a crisis scenario based on destructive disruption rather than ransom negotiation?</p><p>One note of caution is warranted. Some of the more dramatic figures circulating publicly about the Stryker incident appear to originate from attacker claims and have not been independently verified. Boards should be careful not to over-index on those numbers. The confirmed facts are already serious enough and provide more than enough basis for action.</p><p>The Stryker incident is important because it shows how cyber risk can become operational risk very quickly, especially when trusted enterprise control mechanisms are turned against the company itself. </p><p>That is why this event belongs on the board agenda. </p><p>It is not simply a story about one attack. </p><p>It is a warning about the kind of cyber failure that can materially disrupt a modern enterprise.</p>]]></content:encoded></item><item><title><![CDATA[#010 - AI Governance]]></title><description><![CDATA[Essential Strategies for Business Leaders, CEOs, and CISOs]]></description><link>https://www.cybernavigator.org/p/009-ai-governance</link><guid isPermaLink="false">https://www.cybernavigator.org/p/009-ai-governance</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 17 Jun 2025 04:00:20 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/163401385/bef77394a38713afac659f8270aab434.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>As Artificial intelligence rapidly transforms industries, robust AI governance is no longer just about compliance &#8211; it's essential for driving innovation, achieving business value, and ensuring organisational resilience. This episode delves into the critical challenges and best practices of AI governance, tailored specifically for business owners, CEOs,&#8230;</p>
      <p>
          <a href="https://www.cybernavigator.org/p/009-ai-governance">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[5 Budget-Friendly Ways to Improve Security Today]]></title><description><![CDATA[How to Sleep Better at Night Without Spending a Fortune]]></description><link>https://www.cybernavigator.org/p/5-budget-friendly-ways-to-improve</link><guid isPermaLink="false">https://www.cybernavigator.org/p/5-budget-friendly-ways-to-improve</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 10 Jun 2025 04:00:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3A9D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3A9D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3A9D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!3A9D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!3A9D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!3A9D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3A9D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:553292,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/157919610?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3A9D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!3A9D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!3A9D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!3A9D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c525-3e4a-41a7-8e5d-0b6550f16ebf_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">5 Budget-Friendly Ways to Improve Security Today</figcaption></figure></div><p>Companies spend billions on cybersecurity, yet breaches keep happening. The assumption is that more spending equals more security. But the truth is, many organizations waste money on tools they don&#8217;t fully utilize while ignoring simple, cost-effective solutions.</p><p>If you think security requires a massive budget, think again. Some of the most effective defenses cost little or nothing at all. </p><p>Here are five ways to improve your security posture today without spending a fortune.</p><h2>1. Reduce Your Attack Surface - For Free</h2><p>Most attacks don&#8217;t succeed because hackers use advanced techniques. They succeed because companies leave doors wide open.</p><ul><li><p>Unused user accounts remain active</p></li><li><p>Employees have excessive access rights</p></li><li><p>Old software lingers unpatched</p></li><li><p>Cloud services are left exposed with weak configurations</p></li></ul><p>These are free security risks - meaning they cost nothing to fix.</p><p>Actionable steps:</p><ul><li><p>Remove inactive accounts and revoke excessive privileges</p></li><li><p>Enforce the principle of least privilege - employees should only access what they need</p></li><li><p>Regularly audit cloud configurations and close unnecessary access points</p></li><li><p>Patch systems systematically instead of relying on sporadic updates</p></li></ul><p>You don&#8217;t need a new tool for this. You need discipline. And discipline costs nothing.</p><h2>2. Use Open-Source Security Tools Instead of Expensive Software</h2><p>Some companies believe only high-priced enterprise security solutions can protect them. But some of the best cybersecurity tools are free and open-source.</p><p>A few examples:</p><ul><li><p>OSSEC - A host-based intrusion detection system that monitors for unauthorized activity</p></li><li><p>Snort - A powerful network intrusion detection tool used by security professionals worldwide</p></li><li><p>Security Onion - A full security monitoring platform with built-in tools for threat hunting</p></li><li><p>KeePass - A secure, offline password manager to enforce strong credentials</p></li></ul><p>These tools compete with expensive commercial alternatives. The only cost is the time required to configure them properly.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2>3. Automate Security Tasks Instead of Hiring More Staff</h2><p>Security teams are overwhelmed with manual tasks - monitoring logs, responding to alerts, enforcing policies. Hiring more people is expensive. Automating repetitive tasks is not.</p><p>Some low-cost automation options:</p><ul><li><p>Set up alert triggers - Instead of manually checking logs, configure automatic alerts for unusual activity</p></li><li><p>Use script-based automation - Basic security scripts can automatically disable inactive accounts, enforce password resets, or patch systems overnight</p></li><li><p>Leverage built-in security features - Many cloud platforms (AWS, Azure, Google Cloud) offer automated security monitoring for free</p></li></ul><p>Automation allows your existing team to focus on real threats rather than wasting time on routine security maintenance.</p><h2>4. Train Employees With Realistic Attacks, Not Boring Lectures</h2><p>Most security awareness training fails because it&#8217;s treated as a compliance exercise. Employees click through slides, take a multiple-choice test, and forget everything within days.</p><p>Instead, train people with realistic, hands-on attacks:</p><ul><li><p>Conduct phishing simulations where employees experience an actual attack scenario</p></li><li><p>Run live security drills where staff must respond to a staged security incident</p></li><li><p>Offer incentives for employees who report suspicious activity before an actual attack happens</p></li></ul><p>Companies that implement hands-on training reduce phishing click rates by up to 75%. </p><p>The cost? </p><p>Practically nothing. </p><p>The benefit? </p><p>Avoiding costly breaches caused by human error.</p><h2>5. Focus on Incident Response Instead of Just Prevention</h2><p>Most organizations spend money trying to prevent attacks but have weak plans for responding when one happens. The reality is, no system is 100% secure. Attackers only need one vulnerability to get in.</p><p>A well-prepared company can contain an attack in minutes. A poorly prepared company takes weeks - sometimes months - to recover. The difference is preparation, not budget.</p><p>Simple, cost-effective improvements:</p><ul><li><p>Develop a basic incident response playbook that outlines who does what when an attack occurs</p></li><li><p>Conduct table-top exercises to practice responding to real-world attack scenarios</p></li><li><p>Implement offline backups that can be quickly restored in case of ransomware</p></li></ul><p>None of this requires an expensive security solution. It requires planning, execution, and a mindset shift from &#8220;if an attack happens&#8221; to &#8220;when an attack happens.&#8221;</p><h2>The Bottom Line: Security Is About Priorities, Not Just Spending</h2><p>Cybersecurity budgets don&#8217;t guarantee protection. Many breaches happen in companies that spend millions on security. What matters is not just how much money is spent but how effectively it is used.</p><p>The strongest security defenses often come from better policies, tighter controls, and well-trained people. </p><p>The best part? </p><p>They cost nothing but effort.</p><p>The question is not whether you have enough budget for cybersecurity. The question is whether you are using what you already have to its full potential.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[#009 - AI Adoption Under Fire: Why Your Employees Might Be Sabotaging Your Strategy]]></title><description><![CDATA[Uncover the surprising survey results revealing internal resistance and learn how strong AI governance, like ISO 42001, is key to alignment and trust.]]></description><link>https://www.cybernavigator.org/p/009-ai-adoption-under-fire-why-your</link><guid isPermaLink="false">https://www.cybernavigator.org/p/009-ai-adoption-under-fire-why-your</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 03 Jun 2025 04:00:25 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162538148/58ffb380b117aff4e8a7fc04a0c1260a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Join us as we explore the critical intersection of AI innovation, governance, and enterprise adoption. In this episode, we delve into the recently developed <strong>ISO/IEC 42001 standard</strong>, designed to provide a framework for establishing, implementing, maintaining, and continually improving an <strong>AI Management System (AIMS)</strong> within organisations. This standard is i&#8230;</p>
      <p>
          <a href="https://www.cybernavigator.org/p/009-ai-adoption-under-fire-why-your">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Cyber Insurance: Is It Worth It? A CISO’s Guide to Maximizing Coverage]]></title><description><![CDATA[Cyber Insurance Won&#8217;t Save You from an Attack - But It Could Save Your Business. Here&#8217;s What You Need to Know.]]></description><link>https://www.cybernavigator.org/p/cyber-insurance-is-it-worth-it-a</link><guid isPermaLink="false">https://www.cybernavigator.org/p/cyber-insurance-is-it-worth-it-a</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 27 May 2025 04:00:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wQqF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wQqF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wQqF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!wQqF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!wQqF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!wQqF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wQqF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:342617,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/156125838?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wQqF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!wQqF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!wQqF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!wQqF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2fd0e1e-88cc-4447-ab88-5c0f3757c1d5_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cyber Insurance: Is It Worth It? A CISO&#8217;s Guide to Maximizing Coverage</figcaption></figure></div><p>Your company just got hit with a cyber attack: Customer data stolen. Operations shut down. Millions in ransom demanded.</p><p>You call your cyber insurance provider, expecting full coverage - Then you get the bad news. The policy doesn&#8217;t cover ransomware. You didn&#8217;t meet the insurer&#8217;s security requirements.</p><p>Finally, your claim is denied.</p><p>Now what?</p><p>Many companies buy cyber insurance thinking it&#8217;s a safety net. But if you don&#8217;t understand how cyber policies work, you might still be on the hook for millions.</p><p>So, is cyber insurance worth it? And how do you make sure you&#8217;re actually covered when disaster strikes?</p><h2>What Cyber Insurance Actually Covers (And What It Doesn&#8217;t)</h2><p>Cyber insurance isn&#8217;t magic. It won&#8217;t make an attack go away. But it can help pay for the damage.</p><h4>What&#8217;s Typically Covered?</h4><ul><li><p>Incident Response Costs &#8594; Forensic investigations, legal fees, PR crisis management</p></li><li><p>Data Breach Costs &#8594; Notifying customers, offering credit monitoring</p></li><li><p>Ransomware Payments &#8594; If allowed by law</p></li><li><p>Business Interruption &#8594; Lost revenue from downtime</p></li><li><p>Regulatory Fines &#8594; GDPR, CCPA penalties (if included in policy)</p></li><li><p></p></li></ul><h4>What&#8217;s Usually NOT Covered?</h4><ul><li><p>Pre-existing vulnerabilities &#8594; If you failed to patch a known issue</p></li><li><p>Negligence &#8594; If you ignored basic security controls</p></li><li><p>Lost future revenue &#8594; Business damage beyond downtime</p></li><li><p>Reputational harm &#8594; Loss of customers due to breach fallout</p></li></ul><p>Some companies assume they&#8217;re covered until they realize the fine print says otherwise.</p><p>The fix? Get the right policy and make sure you actually qualify for coverage:</p><h4>Step 1: Know What Type of Cyber Insurance You Need. </h4><p>Not all cyber insurance policies are the same.</p><p>There are two main types:</p><ol><li><p>First-Party Coverage &#8594; Covers your company&#8217;s direct losses</p></li></ol><ol start="2"><li><p>Third-Party Coverage &#8594; Covers legal claims from customers, vendors, or partners</p></li></ol><p>Which one do you need?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>If your company handles customer data: Get Third-Party Coverage (protects against lawsuits). If a cyber attack could shut down operations: Get First-Party Coverage (pays for downtime costs). If you store financial or medical records: Get coverage for regulatory fines (GDPR, HIPAA).</p><p>But be careful: Some policies don&#8217;t include ransomware payments. If you want coverage, you need to request it.</p><h4>Step 2: Meet the Security Requirements (Or Your Claim Will Be Denied)</h4><p>Insurance companies don&#8217;t pay out for companies with bad security. If you don&#8217;t meet minimum cybersecurity standards, your policy is useless.</p><p>What insurers look for before approving a claim:</p><ul><li><p>Multi-Factor Authentication (MFA) &#8594; Required for remote access &amp; privileged accounts</p></li><li><p>Regular Patching &amp; Vulnerability Management &#8594; No coverage for ignored security updates</p></li><li><p>Incident Response Plan &#8594; Must show you have a plan for handling breaches</p></li><li><p>Endpoint Detection &amp; Response (EDR) &#8594; Helps detect threats early</p></li><li><p>Access Controls &#8594; Least privilege &amp; Zero Trust measures</p></li></ul><p>But what happens if you don&#8217;t meet these standards? Your insurer can deny your claim - no matter how much you paid in premiums.</p><p>Fix this before an attack happens.</p><h4>Step 3: Watch for Hidden Loopholes in Your Policy</h4><p>Cyber insurance policies are full of fine print.</p><p>Read carefully for these hidden clauses:</p><ul><li><p>&#8220;War Exclusions&#8221; &#8594; Some insurers won&#8217;t cover attacks from nation-state hackers.</p></li><li><p>&#8220;Failure to Maintain Security&#8221; &#8594; If an attack exploits an unpatched system, you might not get paid.</p></li><li><p>&#8220;Acts of Employees&#8221; &#8594; If an insider causes the breach, your policy might not apply.</p></li><li><p>&#8220;Retroactive Coverage&#8221; &#8594; Some policies only cover incidents after a certain date.</p></li></ul><p>Ask your insurer exactly what they cover and what they don&#8217;t - before you sign anything.</p><h4>Step 4: Calculate Your Cyber Insurance Coverage Needs</h4><p>How much should you insure? Here&#8217;s a simple way to estimate:</p><p>Cyber Risk Exposure = (Estimated Attack Likelihood) x (Financial Damage of an Attack)</p><p>But how does translated into the real world? Here&#8217;s an example:</p><ul><li><p>Likelihood of a ransomware attack &#8594; 20% per year</p></li><li><p>Estimated downtime cost &#8594; $10M</p></li><li><p>Regulatory fines &amp; legal fees &#8594; $5M</p></li></ul><p>Total exposure: $3M risk per year</p><p>How much cyber insurance should you buy? At least $3M in coverage - but more if you handle sensitive data.</p><h4>Step 5: Negotiate Your Cyber Insurance Premiums</h4><p>Cyber insurance costs are skyrocketing. In the past 5 years:</p><ul><li><p>Premiums have increased 300%</p></li><li><p>Ransomware claims are up 400%</p></li><li><p>Some companies are getting denied coverage entirely</p></li></ul><p>But you can lower your premiums if you prove strong cybersecurity measures (MFA, EDR, Zero Trust). I also recommend to document and showcase your history of low incidents, because fewer breaches euqals to lower risk.</p><p>And in general, demonstrate an active risk management process and strong incident response processes are a gamechange in negotiating premiums down.</p><p>You might also talk to an insurer who won&#8217;t cover ransomware payments. Then ask for higher business interruption coverage instead.</p><h2>The Bottom Line: Cyber Insurance is NOT a Replacement for Cybersecurity</h2><p>Cyber insurance won&#8217;t stop a breach.</p><p>But if used correctly, it can save your company from financial disaster. Get the right coverage for your business needs. Meet all security requirements - before disaster strikes. Watch for exclusions that could leave you unprotected. Negotiate your policy to maximize coverage at the lowest cost.</p><p>Because at the end of the day, a good cybersecurity strategy prevents attacks.</p><p>A smart cyber insurance policy ensures your business survives when they happen.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[How to stay relevant in a world powered by AI]]></title><description><![CDATA[If your job depends on your keyboard, what happens when AI learns to type better than you?]]></description><link>https://www.cybernavigator.org/p/how-to-stay-relevant-in-a-world-powered</link><guid isPermaLink="false">https://www.cybernavigator.org/p/how-to-stay-relevant-in-a-world-powered</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Wed, 21 May 2025 20:23:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EMLG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EMLG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EMLG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!EMLG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!EMLG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!EMLG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EMLG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:808121,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/164111023?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EMLG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!EMLG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!EMLG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!EMLG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b5ad1e5-0615-464d-be6f-e6aeaaa6c8f2_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">How to stay relevant in a world powered by AI</figcaption></figure></div><p>Cybersecurity is no longer just a technical field. It&#8217;s a battlefield where the pace of change is accelerating, the stakes are higher than ever, and AI is rapidly reshaping the rules of engagement.</p><p>The irony? In an industry built on protecting digital systems, the biggest threat to professionals today might be their own obsolescence.</p><p>So how do you stay relevant in a domain being rewritten by automation, algorithms, and artificial intelligence?</p><p>Here&#8217;s the hard truth&#8212;and the path forward.</p>
      <p>
          <a href="https://www.cybernavigator.org/p/how-to-stay-relevant-in-a-world-powered">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[#008 - Build Resilient AI: Stop Cyber Attacks in Chatbots Before They Happen]]></title><description><![CDATA[Protect Your Brand & Data from GenAI Attacks: Essential Insights for Business Leaders.]]></description><link>https://www.cybernavigator.org/p/008-build-resilient-ai-stop-chatbot</link><guid isPermaLink="false">https://www.cybernavigator.org/p/008-build-resilient-ai-stop-chatbot</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 20 May 2025 04:00:33 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162411191/0271d9191c6cee6198c9d2f920551d63.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Are you a business leader grappling with the excitement and uncertainty of integrating Generative AI chatbots into your operations? While these tools offer incredible potential, they also introduce significant risks that could impact your brand, compromise data, and lead to unauthorised access. <strong>The proliferation of AI chatbots means attackers are alread&#8230;</strong></p>
      <p>
          <a href="https://www.cybernavigator.org/p/008-build-resilient-ai-stop-chatbot">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[#007 - Is Vibe Coding Secure?]]></title><description><![CDATA[Why Vibe Coding Can Become a Gamechanger - Or a Nightmare.]]></description><link>https://www.cybernavigator.org/p/007-is-vibe-code-secure</link><guid isPermaLink="false">https://www.cybernavigator.org/p/007-is-vibe-code-secure</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Wed, 14 May 2025 22:01:02 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/163589285/37b971e6b75883f76ff8d6b06d4fd3f8.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Vibe coding, an emerging approach where AI generates code from natural language descriptions, is rapidly gaining traction for its speed and accessibility. But this innovation comes with significant security challenges: AI-generated code is not inherently secure and can easily introduce vulnerabilities. Research indicates that large language models (LLMs&#8230;</p>
      <p>
          <a href="https://www.cybernavigator.org/p/007-is-vibe-code-secure">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Global Cybersecurity Outlook 2025]]></title><description><![CDATA[Opportunities and Risks in Cybersecurity Derived from the World Economic Forum (WEF)]]></description><link>https://www.cybernavigator.org/p/global-cybersecurity-outlook-2025</link><guid isPermaLink="false">https://www.cybernavigator.org/p/global-cybersecurity-outlook-2025</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 13 May 2025 04:00:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1KXQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1KXQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1KXQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!1KXQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!1KXQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!1KXQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1KXQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:602497,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/162306494?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1KXQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!1KXQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!1KXQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!1KXQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F654810d5-1c99-42e6-855c-36d6dfa67db9_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Global Cybersecurity Outlook 2025: Opportunities and Risks in Cybersecurity 2025</figcaption></figure></div><p>Today's cyberspace is more complex than ever before. Following decades of relative stability, the world is now marked by increased geopolitical conflicts, the growing prowess of cybercriminals, and rapid advances in emerging technologies. This escalating complexity presents a profound challenge to achieving cyber resilience, with significant consequences for organizations and nations. Cyber insecurity is identified as a global risk across multiple time horizons, threatening supply chains, financial stability, and democratic systems. The financial toll is staggering, with losses from cybercrime estimated to have exceeded <strong>$12.5 billion in 2023</strong> according to the FBI. Recent incidents, such as a global IT outage that disrupted numerous critical sectors and caused an estimated $5 billion in losses, starkly underscore the vulnerabilities inherent in our increasingly interconnected digital world. Leaders must adopt a security-first mindset in this complex environment.</p><h2>Why should I care as a business owner?</h2><p>Business leaders today face a confluence of compounding factors driving this complexity, presenting significant pain points. A key challenge is the <strong>increased integration of and dependence on complex supply chains</strong>, leading to a more opaque and unpredictable risk landscape. <strong>Supply chain challenges are the leading cybersecurity risk for organizations</strong>, with 54% of large organizations identifying them as the biggest barrier to achieving cyber resilience. Concerns centre on software vulnerabilities introduced by third parties and the propagation of attacks throughout the ecosystem. Lack of visibility and oversight into the security levels of suppliers is a major issue. Adding to this, dependence on a limited number of critical providers can create systemic points of failure, with cyberattacks or outages causing far-reaching consequences. Managing third-party compliance with security requirements is also a significant challenge.</p><p>Another major concern stems from the <strong>rapid adoption of emerging technologies, particularly AI</strong>, which contributes to new vulnerabilities. While 66% of organizations expect AI to have the most significant impact on cybersecurity in the coming year, only 37% have processes in place to assess the security of AI tools before deployment. This creates a paradox where organizations race to adopt AI without necessary security safeguards, potentially introducing vulnerabilities. Small organizations are particularly exposed, with 69% lacking adequate safeguards for secure AI deployment, exacerbating cyber inequity. Furthermore, cybercriminals are harnessing AI effectively to enhance the sophistication and scale of attacks. Adversarial advances powered by Generative AI are a primary concern for nearly 47% of organizations. These tools lower the cost and required expertise for cybercrime, enabling sophisticated attacks like deepfake impersonations of senior leaders used for fraud. Phishing and social engineering attacks have seen a sharp increase, partly due to AI augmentation.</p><p>The <strong>proliferation of regulatory requirements</strong> around the world adds a significant compliance burden. Over 76% of CISOs report that the fragmentation of regulations across jurisdictions greatly affects their organizations' ability to maintain compliance. Many respondents find regulations too complex, too numerous, or struggle to verify third-party supplier compliance. This intricate "regulatory jigsaw puzzle" can sometimes detract from developing customized, risk-based strategies.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>These challenges are exacerbated by a <strong>widening cyber skills gap</strong>. Two out of three organizations report moderate-to-critical skills gaps, including a lack of essential talent and skills. Only 14% of organizations are confident they have the necessary people and skills today. This shortage leaves organizations vulnerable to sophisticated attacks. The demand for professionals skilled in operating AI and defending against it is growing, yet 67% of leaders noted a shortfall in investments in AI skills within their organizations. Furthermore, burnout among cybersecurity professionals poses a significant retention challenge.</p><p><strong>Escalating geopolitical tensions</strong> are also a major factor, influencing the cybersecurity strategy of nearly 60% of organizations. Geopolitical turmoil affects the perception of risks, with CEOs citing cyber espionage and loss of sensitive information/IP theft as top concerns. State-sponsored attackers are increasingly targeting not just governments but also economies and critical infrastructure, with organizations risking becoming collateral damage. The spillover from nation-state threats into the cybercriminal domain further complicates the landscape. Critical infrastructure, including energy, water, telecommunications, and space technologies, is increasingly targeted.</p><p>This complexity fuels <strong>cyber inequity</strong>, widening the gap between organizations with sufficient resources ("cyber haves") and those struggling ("cyber have-nots"). Some 35% of small organizations believe their cyber resilience is inadequate, a proportion that has increased sevenfold since 2022. By contrast, the share of large organizations reporting insufficient cyber resilience has nearly halved. 71% of cyber leaders believe small organizations have reached a critical tipping point where they cannot adequately secure themselves against rising cyber risks. This inequity extends to regions, with less confidence in critical infrastructure preparedness in Africa and Latin America compared to Europe and North America. The public sector is also disproportionately affected by insufficient resilience and workforce shortages compared to medium-to-large private organizations. Since the overall resilience of the ecosystem is determined by its weakest links, this inequity creates systemic vulnerabilities.</p><p>Business leaders also face challenges in <strong>quantifying cyber risks and their economic impacts</strong>, making it difficult to assess the required investment and balance it with competing priorities. While leaders increasingly integrate cyber-risk management into enterprise risk management, fewer than half of CEOs believe their organizations invest enough.</p><p>Despite these formidable challenges, there is a compelling case for prioritizing cybersecurity. Framing cybersecurity as a <strong>critical investment for the future</strong> rather than a mere expense is essential. Leaders have the opportunity to build resilient ecosystems and safeguard the benefits of digitalization for all. Achieving cyber resilience ensures the organization's ability to minimize the impact of significant cyber incidents on its primary goals and objectives. Proactive security measures, while costly, are negligible compared to the financial consequences of an attack. Effective cybersecurity is not just about technical defence; it's about <strong>safeguarding the business's bottom line, long-term viability, market share, brand trust, and customer confidence</strong>. It supports business continuity and digital trust. Organizations that embrace proactive risk management and collaborative approaches can reduce disparities and address systemic vulnerabilities. Leaders who have the resources to help those without them can enhance the resilience of the entire ecosystem. Ultimately, building resilience demands a shift in perspective, recognizing cybersecurity as a collective responsibility.</p><h2>What can you do?</h2><p>To navigate the increasing complexity and build resilience, business leaders can take several actionable steps:</p><ol><li><p><strong>Adopt a Security-First Mindset and Integrate Cyber Risk into Business Strategy:</strong> View cyber risk not purely as an IT problem but as an overall business risk. <strong>Translate technical risk into business impact</strong>, quantifying risks and their economic effects to align investments with core business objectives. Ensure leadership engagement and oversight, with boards receiving regular updates on cyber risks and trends.</p></li><li><p><strong>Strengthen Supply Chain Cybersecurity:</strong> Recognise that supply chain interdependencies are a top risk. <strong>Enhance visibility into third-party dependencies</strong> and work to enforce security standards on suppliers. Implement secure software development practices and explore standardization or certification for greater trust. Invest in your own business resilience strategies, not relying solely on critical providers like SaaS partners.</p></li><li><p><strong>Adopt AI Securely:</strong> Implement processes to <strong>assess the security of AI tools </strong><em><strong>before</strong></em><strong> deployment</strong>. Foster a strong cyber culture as central to integrating AI safely. Define the right risk tolerance for AI technologies, govern their deployment, and ensure consistency with organizational policies and regulations. Understand organization-specific vulnerabilities related to AI adoption.</p></li><li><p><strong>Address the Cyber Skills Gap:</strong> Acknowledge the critical workforce shortage. <strong>Invest in upskilling current employees</strong> and recruiting from non-traditional backgrounds beyond traditional cyber degrees. Leverage AI to augment human capabilities, focusing on training the workforce to harness AI for positive outcomes. Rethink recruitment practices and prioritize retention strategies, including addressing burnout and promoting employee well-being.</p></li><li><p><strong>Foster Collaboration and Information Sharing:</strong> Recognize that sophisticated, borderless cybercrime demands a unified response. Engage in stronger collaboration between public and private sectors. <strong>Participate in information-sharing and threat intelligence initiatives</strong>, for example, through CERTs or ISACs. Embrace an ecosystem-based approach for collective defence.</p></li><li><p><strong>Improve Incident Response Capabilities:</strong> Accept that 100% security is unattainable; focus on developing adaptable strategies to minimize impact. <strong>Foster a security culture that incentivises incident reporting</strong> through training, support teams, anonymous channels, and non-punitive policies. Develop and utilize cyber-incident response playbooks tailored to incident types.</p></li><li><p><strong>Contribute to Reducing Cyber Inequity:</strong> Larger, more resilient organizations have an incentive to support smaller, less-capable entities to enhance ecosystem resilience. This can involve sharing knowledge or supporting initiatives aimed at capacity building and providing resources to struggling sectors or regions. Advocate for government incentives for SMEs to adopt proactive security measures.</p></li><li><p><strong>Maintain Foundational Cyber Hygiene:</strong> Amid rapid technological change, do not neglect the basics. Continuously prepare to respond to threats by <strong>focusing on foundational practices and vulnerability management</strong>.</p></li><li><p><strong>Integrate IT and OT Security:</strong> Recognize that organizational resilience requires addressing IT and OT security holistically, as they can no longer be treated in isolation. Implement "security by design" and "security by operations," including continuous monitoring and regular assessments for operational environments.</p></li><li><p><strong>Prepare for Quantum Threats:</strong> While the full impact is uncertain, quantum security risks are present. Begin conducting risk assessments and develop a quantum-readiness strategy. Stay informed about and consider adopting post-quantum cryptography standards and related technologies.</p></li></ol><p>Addressing complexity requires decisive leadership action and treating cybersecurity as a strategic imperative rooted in its economic implications. By implementing these actions, leaders can build resilience that permeates the entire organization and contributes to a more secure digital ecosystem for all.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[#006 - WEF Global Cybersecurity Outlook 2025]]></title><description><![CDATA[Building Cyber Resilience According to the WEF 2025]]></description><link>https://www.cybernavigator.org/p/006-wef-global-cybersecurity-outlook</link><guid isPermaLink="false">https://www.cybernavigator.org/p/006-wef-global-cybersecurity-outlook</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 13 May 2025 04:00:40 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162388067/534564ef523e3ec7c77a410a2e08ada3.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Are you a business leader grappling with the overwhelming complexities of the digital world? Feeling the pressure of escalating <strong>cyber risk</strong>, unpredictable geopolitical tensions, and the double-edged sword of AI? If so, you're not alone<strong>. </strong>The <strong>World Economic Forum's Global Cybersecurity Outlook 2025</strong> report highlights that today's cyberspace is more complex &#8230;</p>
      <p>
          <a href="https://www.cybernavigator.org/p/006-wef-global-cybersecurity-outlook">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[#005 - AI First, Humans Second? Shopify Thinks So...]]></title><description><![CDATA[How Business Owners Can Apply This Thinking to Cut Costs and Scale Faster]]></description><link>https://www.cybernavigator.org/p/005-ai-first-humans-second-shopify</link><guid isPermaLink="false">https://www.cybernavigator.org/p/005-ai-first-humans-second-shopify</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 06 May 2025 04:00:36 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/161531259/9f4b5fc01b95df5483902ab5359c1234.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we examine Shopify CEO Tobi L&#252;tke&#8217;s bold directive that redefines how teams operate across the company. Employees must now prove why AI <em>cannot</em> perform a task before hiring or requesting additional resources. This move positions artificial intelligence as a default tool in workflows, not an optional enhancement.</p><p>We explore what this means&#8230;</p>
      <p>
          <a href="https://www.cybernavigator.org/p/005-ai-first-humans-second-shopify">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The CISO’s Guide to Surviving a Ransomware Attack]]></title><description><![CDATA[When Ransomware Hits, Every Second Counts]]></description><link>https://www.cybernavigator.org/p/the-cisos-guide-to-surviving-a-ransomware</link><guid isPermaLink="false">https://www.cybernavigator.org/p/the-cisos-guide-to-surviving-a-ransomware</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 29 Apr 2025 04:00:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!K5JH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K5JH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K5JH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!K5JH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!K5JH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!K5JH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K5JH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:216953,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/157919968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K5JH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!K5JH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!K5JH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!K5JH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fde9e6c-73a6-4779-9ae5-78087868a47d_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The CISO&#8217;s Guide to Surviving a Ransomware Attack</figcaption></figure></div><p>Imagine this: You walk into the office, check your email, and see an urgent message from your security team. The network is locked down. Every file, every system, every critical piece of data is encrypted. A note appears on screens across the company: </p><blockquote><p>&#8220;Pay $5 million in Bitcoin, or you&#8217;ll never see your data again.&#8221;</p></blockquote><p>Your mind races. How did this happen? How much damage is already done? Should you pay? What if they take the money and still leak your data?</p><p>For CISOs, this is not a hypothetical scenario. It is a daily reality somewhere in the world. Every year, ransomware attacks cost businesses billions of dollars. The worst part? Even companies with strong security measures fall victim. But those who survive &#8211; those who recover without crippling losses &#8211; do not rely on luck. They have a plan.</p><h2>Ransomware is a Business Killer</h2><p>Ransomware attacks are no longer just about locking files. Modern attacks exfiltrate data before encryption, ensuring that even if you have backups, hackers still have leverage. They threaten to leak customer records, financial statements, and intellectual property.</p><p>For a CISO, the stakes are clear:</p><ul><li><p>Financial Damage - Ransom demands are increasing, but the real cost comes from downtime, lost revenue, and regulatory fines.</p></li><li><p>Reputation at Risk - Customers and partners will ask one question: Can we still trust you?</p></li><li><p>Legal Consequences - Depending on your industry, you could face lawsuits, government investigations, and compliance penalties.</p></li></ul><h2>When Seconds Turn Into Millions</h2><p>The worst time to plan for a ransomware attack is during a ransomware attack. Once hackers have locked your systems, time works against you. Every minute of downtime costs money. In critical industries like healthcare and finance, losses can reach millions per hour. Incident response teams scramble to understand the scope of the attack, but without a predefined strategy, chaos takes over. The pressure to pay grows as employees, customers, and executives demand immediate action.</p><p>Some companies recover quickly, while others never do. The difference is preparation.</p><h2>A Battle-Tested Ransomware Survival Plan</h2><p>A ransomware attack is not an IT problem. It is a business crisis. The companies that survive follow a structured plan before, during, and after the attack. The only way to win against ransomware is to assume it will happen and prepare accordingly.</p><h4>(1) Backups That Actually Work</h4><p>Daily backups are useless if attackers encrypt them too. Store backups offline, in air-gapped systems. Test restoration regularly. A backup that cannot be restored in real-world conditions is worthless.</p><h4>(2) Segment Your Network</h4><p>Limit the blast radius of an attack. Use zero-trust principles: no user or system should have access to more than necessary. Implement strict access controls and multi-factor authentication (MFA).</p><h4>(3) Train Employees Like It&#8217;s Life or Death</h4><p>Over 90% of ransomware attacks start with phishing. Teach employees how to recognize suspicious emails, unusual requests, and social engineering tactics.</p><h4>(4) Have a Ransomware-Specific Incident Response Plan</h4><p>A general cybersecurity plan is not enough. Assign clear roles: Who makes the call on paying ransom? How is the company communicating with customers and regulators? Also, conduct tabletop exercises. Simulate real attacks so teams can practice decision-making under pressure.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>During the Attack: Contain the Damage</h2><p>The first few hours determine the scale of the disaster. The goal is to limit the attack&#8217;s spread and assess the situation.</p><h4>(5) Isolate Infected Systems</h4><p>Disconnect compromised machines from the network immediately. Shut down file-sharing services and cloud connections to prevent further encryption.</p><h4>(6) Do Not Rush to Pay</h4><p>Paying ransom does not guarantee recovery. Some attackers take the money and disappear. Others leave backdoors for future attacks. If customer data is stolen, paying ransom does not erase the legal consequences.</p><h4>(7) Engage External Experts Immediately </h4><p>Call your incident response team. If you do not have one, this is the moment you realize why you should have. Contact law enforcement. Many governments discourage ransom payments, but they can provide intelligence on whether decryption tools exist for the specific ransomware strain.</p><h4>(8) Secure Internal and External Communication</h4><p>Assume hackers have access to your email system. Use out-of-band communication channels for critical discussions. Avoid making public statements until you have a full understanding of the situation.</p><h2>After the Attack: Recover and Prevent the Next One</h2><p>Once the immediate crisis is contained, the real work begins.</p><h4>(9) Restore Systems in Phases</h4><p>Rushing to bring everything back online can reintroduce malware. Recover in stages, starting with critical infrastructure.</p><h4>(10) Investigate How the Attack Happened</h4><p>Was it a phishing email? A compromised remote desktop protocol (RDP) login? A software vulnerability? Conduct a full forensic analysis. Find the initial entry point and close it permanently.</p><h4>(11) Rebuild Trust with Customers and Regulators</h4><p>Be transparent but strategic in communication. A well-handled response can strengthen credibility, while a poor one can destroy it. Offer identity protection services to affected customers if personal data was exposed.</p><h4>(11) Harden Security Against the Next Attack</h4><p>If you were attacked once, you are now a target for future attacks. Hackers know you might pay again. Invest in threat detection, endpoint security, and real-time monitoring to catch suspicious activity before it escalates.</p><h2>A Simple Rule: Plan Like You Have Already Been Hacked</h2><p>Most companies that survive ransomware do not survive because they were lucky. They survive because they expected an attack and built defenses accordingly.</p><p>They had tested backups. They had an incident response team ready. They knew exactly what to do the moment the first ransom note appeared.</p><p>For a CISO, there is no question of if ransomware will strike, only when. Those who prepare today will still have a company to protect tomorrow.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[#004 - Israel's Cybersecurity Strategy: Turning Threat into Competitive Edge]]></title><description><![CDATA[Insights from Israel's National Strategy for Global Enterprises]]></description><link>https://www.cybernavigator.org/p/004-israels-cybersecurity-strategy</link><guid isPermaLink="false">https://www.cybernavigator.org/p/004-israels-cybersecurity-strategy</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 22 Apr 2025 04:00:41 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/160507356/e2cfbf8137f6ff2d131db4dcbe925be0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>The October 7th attacks have triggered a significant shift in Israel's cybersecurity posture. We unpack the newly updated National Cybersecurity Strategy for 2025, analyzing its strategic response to threats from Iran and its proxies. This episode examines the three-pillar strategy: securing national cyberspace, fostering collaboration, and developing f&#8230;</p>
      <p>
          <a href="https://www.cybernavigator.org/p/004-israels-cybersecurity-strategy">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The 3 Security Metrics That Actually Matter to Your CEO]]></title><description><![CDATA[Why Most Security Reports Go Unread]]></description><link>https://www.cybernavigator.org/p/the-3-security-metrics-that-actually</link><guid isPermaLink="false">https://www.cybernavigator.org/p/the-3-security-metrics-that-actually</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 15 Apr 2025 04:01:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7sS4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7sS4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7sS4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!7sS4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!7sS4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!7sS4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7sS4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:564778,&quot;alt&quot;:&quot;The 3 Security Metrics That Actually Matter to Your CEO&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybernavigator.org/i/160503294?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The 3 Security Metrics That Actually Matter to Your CEO" title="The 3 Security Metrics That Actually Matter to Your CEO" srcset="https://substackcdn.com/image/fetch/$s_!7sS4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!7sS4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!7sS4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!7sS4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60b40951-f3b9-41b1-8b4f-e763a9ee666e_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The 3 Security Metrics That Actually Matter to Your CEO</figcaption></figure></div><p>Most CISOs walk into executive meetings armed with charts, dashboards, and detailed threat reports. They leave those meetings frustrated, wondering why the CEO looked bored halfway through.</p><p>Here&#8217;s the truth: it&#8217;s not because cybersecurity isn&#8217;t important. It&#8217;s because most of what gets reported has no connection to how a CEO thinks.</p><p>Telling your CEO about patch compliance percentages, threat feed volumes, or port scan detections is like explaining turbulence patterns to passengers mid-flight. It may be accurate, but it doesn&#8217;t help them understand whether the plane is going to land safely.</p><p>CEOs don&#8217;t want to understand cybersecurity. They want to understand risk, impact, and performance. In other words, they want clarity on one thing: <strong>how safe is the business, and what&#8217;s it going to cost if it isn&#8217;t?</strong></p><h2><strong>Information Overload, No Business Clarity</strong></h2><p>Cybersecurity teams often present metrics that make perfect sense to a security professional but mean very little to someone running a company. CEOs don&#8217;t care how many alerts the SIEM generated last month. They care about how exposed the company is, how soon you&#8217;ll know if something goes wrong, and how much damage can be avoided.</p><p>This disconnect creates friction. CISOs feel unheard. CEOs feel overwhelmed by technical detail. And somewhere in between, important decisions are delayed or misinformed.</p><h2><strong>The Cost of Misaligned Communication</strong></h2><p>When a breach happens, the question isn&#8217;t <em>why wasn&#8217;t the SIEM fine-tuned enough?</em> The question is <em>why didn&#8217;t we see this coming?</em></p><p>Boards and CEOs expect CISOs to provide clarity, not noise. When security reporting doesn&#8217;t match executive priorities, the result is underfunded initiatives, ignored warnings, and slow responses.</p><p>In high-stakes environments, miscommunication isn&#8217;t just inefficient. It&#8217;s dangerous.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Focus on the Metrics That Reflect Business Risk</strong></h2><p>These are the three security metrics that actually resonate in the boardroom.</p><h4><strong>(1) Time to Detect (TTD) and Time to Respond (TTR)</strong></h4><p><strong>What it tells the CEO:</strong><br>How long is our business exposed before a threat is identified and contained?</p><p>CEOs understand time. Time is money, reputation, and liability. If your average detection time is 72 hours, you&#8217;re telling your CEO that attackers have three days to move laterally, exfiltrate data, or encrypt systems. That&#8217;s not a technical detail - that&#8217;s a threat to business continuity.</p><p><strong>How to report it:</strong><br>Use a simple model:</p><ul><li><p>"We currently detect threats in an average of 4 hours."</p></li><li><p>"Our containment time is 6 hours, down from 18 hours last quarter."<br>Then explain the impact:</p></li><li><p>"This reduces potential breach damage by over 40 percent based on current threat modeling."</p></li></ul><p>Frame it in time and money, not tools and logs.</p><h4><strong>(2) Risk Reduction Over Time</strong></h4><p><strong>What it tells the CEO:</strong><br>Are we actually getting safer?</p><p>CEOs think in progress, not process. They want to see whether investments in cybersecurity are lowering the company&#8217;s risk exposure. If you can't show measurable change, it doesn&#8217;t matter how many controls you've deployed.</p><p><strong>How to report it:</strong><br>Use a risk scoring model with clear comparisons.</p><ul><li><p>"At the start of the year, our top 10 business-critical systems had a combined risk score of 820."</p></li><li><p>"Today, that number is 540, due to new access controls and vulnerability remediation."</p></li></ul><p>This tells the CEO that money spent on security resulted in measurable risk reduction. That&#8217;s the kind of outcome that gets funded again.</p><h4><strong>(3) Financial Exposure from Cyber Risk</strong></h4><p><strong>What it tells the CEO:</strong><br>How much could a breach cost us - and how much are we saving by reducing that risk?</p><p>CEOs are fluent in financial models. If you can&#8217;t translate cyber risk into economic impact, you&#8217;ll lose your seat at the strategy table.</p><p><strong>How to report it:</strong><br>Calculate exposure using business impact assessments. For example:</p><ul><li><p>"A ransomware attack on our order processing system would cost us an estimated $2.1 million in downtime and lost revenue."</p></li><li><p>"Based on current controls, that exposure is now down to $850,000."</p></li></ul><p>That reduction isn&#8217;t just security progress - it&#8217;s operational protection, reputational insurance, and a bottom-line benefit.</p><h2><strong>Be a Translator, Not a Technician</strong></h2><p>You are not in that boardroom to showcase how well your team configured firewalls. You are there to articulate risk and demonstrate impact.</p><p>The CEO doesn&#8217;t need a tour of the control room. They need a flight plan. Focus on the few metrics that speak their language - time, risk, and money.</p><p>The better you tell the story, the more they will listen. And the more they listen, the safer the business becomes.</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/p/the-3-security-metrics-that-actually?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Cyber Navigator! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/p/the-3-security-metrics-that-actually?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybernavigator.org/p/the-3-security-metrics-that-actually?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[#003 - Harvest Now, Decrypt Later: Are Your Secrets Already Compromised?]]></title><description><![CDATA[The Immediate Quantum Risk Every Organization Needs to Understand.]]></description><link>https://www.cybernavigator.org/p/003-harvest-now-decrypt-later-are</link><guid isPermaLink="false">https://www.cybernavigator.org/p/003-harvest-now-decrypt-later-are</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Tue, 08 Apr 2025 04:01:15 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/160501441/f4997ac6f111eebfdc0c642ba12fe5fd.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Is your organization ready for the quantum revolution? This week, we break down the <em>Quantum Threat Timeline Report 2024</em> to give business leaders and cybersecurity managers a clear and actionable understanding of the looming quantum threat. We discuss the potential for quantum computers to break current encryption (like RSA), the expert predictions on wh&#8230;</p>
      <p>
          <a href="https://www.cybernavigator.org/p/003-harvest-now-decrypt-later-are">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[#002 - AI Security: The Essentials]]></title><description><![CDATA[Actionable Guidelines to Prevent Your AI Advantage from Becoming a Liability]]></description><link>https://www.cybernavigator.org/p/002-ai-security-the-essentials</link><guid isPermaLink="false">https://www.cybernavigator.org/p/002-ai-security-the-essentials</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Thu, 03 Apr 2025 06:05:45 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/160344730/219353b8890b69b0ce48d8ca658a81a9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Is your company's AI strategy leaving you exposed to critical AI security risks? As Artificial Intelligence becomes deeply embedded in your enterprise, standard cybersecurity measures often fall short against unique threats targeting AI systems. Protecting your valuable data, proprietary models, and operational integrity isn't just an IT task &#8212; it's a c&#8230;</p>
      <p>
          <a href="https://www.cybernavigator.org/p/002-ai-security-the-essentials">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[How to Prove Cybersecurity ROI to Your Board]]></title><description><![CDATA[Why Cybersecurity is Always a Hard Sell]]></description><link>https://www.cybernavigator.org/p/how-to-prove-cybersecurity-roi-to</link><guid isPermaLink="false">https://www.cybernavigator.org/p/how-to-prove-cybersecurity-roi-to</guid><dc:creator><![CDATA[Tobias Faiss]]></dc:creator><pubDate>Wed, 02 Apr 2025 04:07:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_1Tr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_1Tr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_1Tr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!_1Tr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!_1Tr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!_1Tr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_1Tr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1351617,&quot;alt&quot;:&quot;How to Prove Cybersecurity ROI to Your Board&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="How to Prove Cybersecurity ROI to Your Board" title="How to Prove Cybersecurity ROI to Your Board" srcset="https://substackcdn.com/image/fetch/$s_!_1Tr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!_1Tr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!_1Tr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!_1Tr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2a5452-e1a3-4a6d-b215-8a2ed47ea178_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">How to Prove Cybersecurity ROI to Your Board</figcaption></figure></div><p>Cybersecurity doesn&#8217;t generate revenue. It doesn&#8217;t launch new products. It doesn&#8217;t add customers.</p><p>At least, that&#8217;s how most board members see it.</p><p>To them, it&#8217;s just another expense - like office rent or printer paper. </p><p>Necessary, but not exciting.</p><p>But here&#8217;s the problem: when cybersecurity is treated as a <strong>cost</strong> instead of an <strong>investment</strong>, budgets get cut. And when budgets get cut, security gaps open up. That&#8217;s when breaches happen, regulators step in, and lawsuits start flying.</p><p>The key to fixing this? Stop talking about security in technical terms. Start talking about it <strong>like an investment</strong> - one that <strong>saves</strong> money, <strong>protects</strong> revenue, and <strong>reduces</strong> risk.</p><p>Here&#8217;s how to prove cybersecurity&#8217;s ROI in a way your board will actually listen to.</p><h2><strong>Step 1: Show How Security Saves the Company Money</strong></h2><p>If you&#8217;re asking for a $2 million security budget, you need to show that it&#8217;s saving <strong>more</strong> than $2 million.</p><p>Most companies don&#8217;t track this. But you can.</p><h3><strong>How to Calculate It</strong></h3><ol><li><p><strong>Find the Cost of a Cyber Incident</strong> - Look at industry breach reports. If similar companies face an average breach cost of $5 million, that&#8217;s your baseline risk.</p></li><li><p><strong>Estimate the Likelihood of an Attack</strong> - Use historical data or industry reports to determine the probability of a major incident in a given year (say, 20%).</p></li><li><p><strong>Show How Security Reduces This Risk</strong> - If your investments cut the likelihood of a breach from 20% to 5%, you just saved millions.</p></li></ol><p>Example:</p><ul><li><p>Company risk without strong security: <strong>20% chance of a $5M breach = $1M expected loss per year</strong></p></li><li><p>With improved security: <strong>5% chance of a $5M breach = $250K expected loss per year</strong></p></li><li><p><strong>That&#8217;s a $750K savings - meaning security investments are paying for themselves.</strong></p></li></ul><p>Now, instead of asking for budget, you&#8217;re showing how cybersecurity <strong>prevents financial losses</strong>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybernavigator.org/subscribe?"><span>Subscribe now</span></a></p><h2><strong>Step 2: Show How Security Protects Revenue</strong></h2><p>When security works, nothing happens. No downtime. No lawsuits. No lost customers.</p><p>But when security fails? The financial damage can be massive.</p><h3><strong>How to Prove It</strong></h3><ol><li><p><strong>Find Your Company&#8217;s Revenue Per Hour</strong> - Work with finance to calculate how much money your company makes per hour.</p></li><li><p><strong>Estimate Downtime Costs</strong> - If a ransomware attack takes systems down for 24 hours, multiply that by revenue per hour.</p></li><li><p><strong>Show How Security Reduces Downtime Risk</strong> - Highlight investments in <strong>incident response</strong>, <strong>backup systems</strong>, and <strong>real-time monitoring</strong> that minimize downtime.</p></li></ol><p>Example:</p><ul><li><p>Company generates <strong>$500K per hour</strong></p></li><li><p>A ransomware attack could cause <strong>24 hours of downtime = $12M loss</strong></p></li><li><p>Security investments reduce downtime risk by <strong>80%</strong>, preventing a <strong>$9.6M potential loss</strong></p></li></ul><p>Now, security isn&#8217;t just a cost - it&#8217;s <strong>business insurance</strong> that keeps revenue flowing.</p><h2><strong>Step 3: Show How Security Avoids Fines and Lawsuits</strong></h2><p>Regulators don&#8217;t care about excuses. If you lose customer data, you <strong>will</strong> get fined.</p><h3><strong>How to Calculate the Risk</strong></h3><ol><li><p><strong>Look at Recent Fines in Your Industry</strong> - Find cases where companies paid millions for security failures (GDPR, CCPA, PCI-DSS violations).</p></li><li><p><strong>Show Your Compliance Risk</strong> - If your security controls don&#8217;t meet requirements, you&#8217;re in the same danger.</p></li><li><p><strong>Show How Security Investments Prevent This</strong> - Highlight investments in <strong>compliance automation</strong>, <strong>data protection</strong>, and <strong>risk assessments</strong> that keep the company out of trouble.</p></li></ol><p>Example:</p><ul><li><p>GDPR fines can be <strong>4% of annual revenue</strong></p></li><li><p>If your company makes <strong>$1B per year</strong>, a data breach could mean a <strong>$40M fine</strong></p></li><li><p>Investing <strong>$2M in compliance</strong> saves <strong>$38M in potential legal costs</strong></p></li></ul><p>At this point, the board isn&#8217;t asking <strong>why</strong> they should fund security. They&#8217;re asking how fast they can approve it.</p><h2><strong>How to Use This in Your Next Board Meeting</strong></h2><p>Forget the technical slides. Bring <strong>numbers</strong>. Show <strong>financial impact</strong>. Speak in <strong>business terms</strong>.</p><p>Instead of saying:</p><blockquote><p><em>"We need $2M for endpoint security and SIEM upgrades."</em></p></blockquote><p>Say:</p><blockquote><p><em>"This investment will prevent an estimated $10M in losses from breaches, downtime, and fines."</em></p></blockquote><p>That&#8217;s how you move cybersecurity from an expense to an investment. And that&#8217;s how you get the budget you need - without the usual pushback.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybernavigator.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Navigator is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item></channel></rss>