Navigator
Cyber Supply Chain Security
by Warwick Ashford
Every business has a supply chain upon which it relies. Any disruption to that a supply chain has a knock-on effect on all the businesses that depend on it. Most organizations are well versed in securing physical supply chains, but the world has changed, and now there is a cyber component to just about every supply chain.  Supply chains are no longer purely analog. Many now are entirely digital, and virtually all the rest are hybrid. Even if goods and services are physical, the planning, design, sorting, logistics and transport systems around them rely on IT software and services...
Blog
The Importance of SME’s Cybersecurity
by Marius Goeddert
Complete the following sentence: “Cybersecurity is... / is not...” Cybersecurity is... Cybersecurity is really hard. One of the things that I think we should never forget, we exist in an imperfect world. Security controls are varied and complex, and we face every day a dynamic and relentless adversary. So I always tell people cybersecurity is really, really hard and it needs us all to work together to make it a little bit easier for some of us. What prompted you to work in cybersecurity? I think I was first prompted to work in cybersecurity many, many years...
Blog
Is It Possible to Recover After a Cyberattack?
by Marina Iantorno
Unfortunately, every organization is vulnerable to a cyberattack. We have seen in the last years a considerable increase in cybercrime and the negative impact that it causes on businesses. The obvious consequences are financial, but that is just the tip of the iceberg. There are several other aspects to consider, such as intellectual property loss, reputation damage, or data privacy breaches. It is undeniable that there is no way to be totally safe, but it is always good to work on a plan to mitigate disasters and cyber-crisis. Disaster plan vs Cyber recovery plan Although a disaster...
Navigator
Digital Transformation
by Warwick Ashford
The digital age has dawned, and organizations are adopting digital processes and services as quickly as they can to remain competitive in an unpredictable commercial environment affected by rapid social change and technological innovation. Without a doubt, it is essential for modern organizations to have a digital transformation strategy or risk losing market share to others who are adapting to the demands and opportunities of the digital era, driven by commercial necessity and the demand for convenience. Consumers and citizens are demanding easy, convenient, and engaging ways of...
Blog
Cyber-Crisis Becomes an Opportunity for Insurers
by Marina Iantorno
The pandemic changed our lives in many ways, some good and some bad. However, one impact has been that that cyber-attacks are more prevalent than ever before.  Every organization across all industry sectors is now a target of cyber-crime. It seems like every day another cyber-security incident is reported in the press. Phishing emails, triplets, ransomware, SMS with embedded malware are now threatening organizations daily. These threats have put the spotlight on cyber-insurance. Having a cyber insurance policy in place is now a must for a wide range of organizations, but there are...
Blog
Martin Kuppinger's Must Watch Sessions
by Martin Kuppinger
CSLS (Cybersecurity Leadership Summit) 2022, a fully hybrid event taking place Nov 8th to 10th in Berlin, is approaching quickly. Being asked to pick few must watch sessions, I had the challenge of selecting only a few, instead of a long list of sessions worthwhile to attend or stream. Here are my five favorites.  Frank Fischer, CISO of the Deutsche Bahn, will talk about the role a Software Bill of Materials (SBOM) can potentially play in increasing cyber resilience. Just a hype or the one thing we need to tackle Cybersecurity Supply Chain Security?  With...
Blog
Training Non-techies on Cybersecurity Awareness
by Martin Kuppinger
Most users are just a bit techie. Some more, some less. But as we all know, real cybersecurity experts are rare. Thus, it is best to assume that the ones you want to educate on cybersecurity awareness and response are no technical, nor cybersecurity experts.  However, with everyone of us being a user of devices in personal life, and everyone being in danger of cyber-attacks, cybersecurity awareness training has become way easier. The approach I take for several years now is to focus on what this means on the own device, in the personal life, and then to transfer to the business...
Navigator
CIAM a Way of Managing and Getting Value from Consumer Data
by Warwick Ashford
As interactions between organizations and consumers of goods and services increasingly happen online, the collection, protection, and management of consumer information has become increasingly important and challenging. In response, we have seen the emergence of Consumer Identity and Access Management solutions as organizations seek greater efficiencies and capabilities in dealing with customer information to deliver innovative services, engage with consumers, and build brand loyalty, while ensuring they operate within the confines of data protection regulations. CIAM has developed...
Blog
Countering State-Sponsored Cyber Attacks
by Marius Goeddert
  What makes Nation State Actors so special compared to other threat actors? I think it's important to understand the differences between the different threat actor groups, I think is super important for a CISO. Those are usually seen as the following. We have the insiders, on the one hand, the attack comes from the inside. So it's an employee which intentionally, accidentally or abused from the outside helps on an attack. We've seen this in the Ukraine situation. So latest since then, this is a concern. The second group that CISOs are concerned about is the...
Navigator
State-sponsored Cyber Attacks
by Warwick Ashford
Leading organizations have long factored state-sponsored cyber-attacks into their risk-based cyber defense planning, but the need to do so has been highlighted in recent months due to an increase in this type of attack associated with the conflict in Ukraine. The primary goal of these state-sponsored attackers is to identify and exploit the national infrastructure vulnerabilities, gather intelligence, and exploit systems, which can easily impact the business operations of both public and private sector organizations. According to the UK’s National Cyber Security Centre (NCSC),...
Previous
4 5 6 7 8 9 10 Next