RESOURCES


home.aspx
   
"Midstream Oil and Gas Industry - Improving ICS Visibility Boosts Operations and Cyber Security" "MIDSTREAM OIL AND GAS INDUSTRY - IMPROVING ICS VISIBILITY BOOSTS OPERATIONS AND CYBER SECURITY"

whitepaper

Aug 04, 2020

Read this document to learn: The ICS visibility and cyber security challenges of midstream operators How passive ICS monitoring works Cyber security use cases Expert insights on detecting equipment failure and cyber risks What to look for in an ICS visibility and cyber security solution

Read More

Zero Trust – Demystified ZERO TRUST – DEMYSTIFIED

article

Jul 29, 2020

1. Zero Trust – DemystifiedEveryone seems to be talking about Zero Trust in the security world at the moment. Unfortunately there seems to be multiple definitions of this depending on which vendor you ask. To help others understand what Zero Trust is, this white paper covers the key aspects of...

Read More

2020 Cyber Security Predictions 2020 CYBER SECURITY PREDICTIONS

whitepaper

Jan 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combinat...

Read More

Going Viral: The Challenges & Urgency of Managing TPRM GOING VIRAL: THE CHALLENGES & URGENCY OF MANAGING TPRM

whitepaper

Jan 24, 2020

Managing cyber risks has become more challenging and urgent as businesses expand their vendor ecosystems.It is difficult enough for organizations to manage their own internal vulnerabilities, but even more challenging to ensure that every vendor across their supply chain has strong security practice...

Read More

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise CYBER RISK APPETITE: DEFINING AND UNDERSTANDING RISK IN THE MODERN ENTERPRISE

whitepaper

Jan 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact,...

Read More

An Expanding Attack Surface: 5 Tips to Manage Third-Party Risk AN EXPANDING ATTACK SURFACE: 5 TIPS TO MANAGE THIRD-PARTY RISK

whitepaper

Jan 02, 2020

As organizations become increasingly reliant on third-parties, they expand their attack surface & put themselves at risk.Today's digital environment offers unprecedented opportunities for organizations to improve the customer experience and efficiency of their operations. At the same time, e...

Read More

Going Viral: The Challenges & Urgency of Managing TPRM GOING VIRAL: THE CHALLENGES & URGENCY OF MANAGING TPRM

whitepaper

Dec 27, 2019

Managing cyber risks has become more challenging and urgent as businesses expand their vendor ecosystems. It is difficult enough for organizations to manage their own internal vulnerabilities, but even more challenging to ensure that every vendor across their supply chain has strong security practic...

Read More

Cybersecurity Benchmarking & Security Performance Management CYBERSECURITY BENCHMARKING & SECURITY PERFORMANCE MANAGEMENT

whitepaper

Dec 27, 2019

Executives and Board members demand to know the answers to these questions, but every cybersecurity professional knows that answering them isn’t as simple as it seems.The available tools for analyzing cybersecurity performance (assessments, audits, software, etc.) don’t always provide ac...

Read More

Cyber Security Awareness CYBER SECURITY AWARENESS

infographic

Dec 20, 2019

Cyber security awareness promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks.

Read More

SMART CITIES AND CYBERSECURITY: THE ESSENTIALS SMART CITIES AND CYBERSECURITY: THE ESSENTIALS

article

Nov 19, 2019

With the growing popularity of IoT and digitization, smart cities have become a reality. Harnessing the power of data, design thinking, and digital technologies, smart cities are the sure future of urban lifestyle. However, as with other digital transformations, smart cities bring with them a barrag...

Read More

MEASURING ORGANIZATION’S CYBERSECURITY MEASURING ORGANIZATION’S CYBERSECURITY

article

Nov 15, 2019

No individual or company is sheltered from the reach of cybercriminals. Corporate data breaches are more typical than any time ever, and notwithstanding progresses in security programming, hackers keep on getting increasingly sophisticated and hard to identify.As an entrepreneur, cybersecurity ought...

Read More

What’s the answer to the vulnerability overload problem? Key findings from ESG’s Cyber Risk Management survey WHAT’S THE ANSWER TO THE VULNERABILITY OVERLOAD PROBLEM? KEY FINDINGS FROM ESG’S CYBER RISK MANAGEMENT SURVEY

whitepaper

Oct 16, 2019

Cyber risk management is demanding work. Vulnerabilities are growing, threat actors are smarter and pressure from the executive team is intensifying. What used to be a side IT conversation is now a top business priority. You finally have the full attention of the C-suite and board – but, do you know...

Read More

Is Your Enterprise Cyber Risk Managed Well? IS YOUR ENTERPRISE CYBER RISK MANAGED WELL?

article

Oct 07, 2019

In this article I want to share with you the secrets to being able to assess whether the enterprise cyber risk in your organization is being managed effectively using a simple set of questions. These are questions that will work even if you are not working in the security function – and I thin...

Read More

Implementing the FAIR Model IMPLEMENTING THE FAIR MODEL

whitepaper

Sep 27, 2019

Reporting on cyber risk has become a top priority for the Board of Directors of most large enterprises. Calculating a meaningful risk score and building an effective risk mitigation strategy can be challenging. Can science improve the way we view and quantify cyber risk? Absolutely. The FAIR methodo...

Read More

The Cyber Risk to Food Processing and Manufacturing THE CYBER RISK TO FOOD PROCESSING AND MANUFACTURING

whitepaper

Sep 20, 2019

Almost every week brings news of a new cybersecurity incident. These typically effect companiesand organizations in the financial, retail, or healthcare industries or, more recently, state and localgovernments. They also usually involve data breaches or other attacks that affect informationtechnolog...

Read More

Artificial Intelligence – Helping Cyber Security ARTIFICIAL INTELLIGENCE – HELPING CYBER SECURITY

article

Aug 29, 2019

Artificial Intelligence (AI) is now playing a significant role in helping to managing cyber risk. This was recently evident in the aftermath of the Nordsk Hydro ransomware attack where AI was utilised to identify further vulnerabilities. This form of automative technology would seem to be a good mat...

Read More

The Evolution of Industrial Cybersecurity and Cyber Risk THE EVOLUTION OF INDUSTRIAL CYBERSECURITY AND CYBER RISK

whitepaper

Aug 08, 2019

From Assessment to Automation: Addressing the Cyber Risk Lifecycle in Critical Environments Cybersecurity threats and breaches continue to make headline news with impact across all industries and sectors. The consequences of successful cybersecurity attacks, such as production disruption, product qu...

Read More

How Electric Utilities Can Reduce Their Cyber Risk HOW ELECTRIC UTILITIES CAN REDUCE THEIR CYBER RISK

article

Jul 17, 2019

A successful cyberattack against the electric grid could have enormous consequences that would ripple throughout other industries. In a January 2019 report, “Managing Cyber Risk in the Electric Power Sector,” Deloitte notes that energy is one of 16 critical infrastructure sectors identif...

Read More

Why 5G and AI will determine cybersecurity strategy for the next decade WHY 5G AND AI WILL DETERMINE CYBERSECURITY STRATEGY FOR THE NEXT DECADE

article

Jul 08, 2019

BI.ZONE CEO Dmitry Samartsev and World Economic Forum head of operations William Dixon analysed the most popular technologies and evaluated the cyber risks of tomorrow. Experts talked about the three technologies that are likely to determine the next decade expressed in a joint analytical article. O...

Read More

SECURITY THROUGH INNOVATION SECURITY THROUGH INNOVATION

whitepaper

Jul 07, 2019

Our Cyber Security Consultancy team has international experience at the world’s top consulting firms. Building on these foundations, they joined Secgate to design and deliver solutions that are proactive rather than reactive, flexible enough to be tailored to a client’s individual proble...

Read More

Level of Cyber Risk to Businesses Held Steady in First Quarter According to LEVEL OF CYBER RISK TO BUSINESSES HELD STEADY IN FIRST QUARTER ACCORDING TO

article

Jun 25, 2019

Cyber security executives and teams—and for that matter organizations as a whole—could certainly use some good news when it comes to risk assessment, and perhaps a recent report provides just that. The Assessment of Business Cyber Risk (ABC) report released in April 2019 by the U.S. Cham...

Read More

How to Survive a Cyber Incident | Timothy Wood | KPMG HOW TO SURVIVE A CYBER INCIDENT | TIMOTHY WOOD | KPMG

video

Jun 23, 2019

In today’s digital world, decision-makers can’t afford to be held back by cyber risks. They need to make bold decisions and feel confident that their cyber strategy, defenses and recovery capabilities will protect their business and support their growth strategies. Timothy Wood, Associat...

Read More

SANS 2019 State of OT/ICS Cybersecurity Security Survey SANS 2019 STATE OF OT/ICS CYBERSECURITY SECURITY SURVEY

infographic

Jun 21, 2019

People remain the greatest threat to industrial control systems (ICS) and associated networks, according to a SANS survey focused on better understanding cybersecurity risks to operational technology (OT) systems. More than half of respondents also see the cyber risks to their safe and reliable oper...

Read More

Empowering Women in Cyber Risk Management EMPOWERING WOMEN IN CYBER RISK MANAGEMENT

video

Jun 20, 2019

We are collaborating with government ministries and agencies to introduce a reskilling cyber security programmed called ‘Empowering Women in Cyber Risk Management’.

Read More

The state of cyber security in 2019: A half-year retrospective THE STATE OF CYBER SECURITY IN 2019: A HALF-YEAR RETROSPECTIVE

article

Jun 12, 2019

For most of North America, approaching the middle of the year means going on summer vacation, preparing for the Atlantic hurricane season and enjoying warmer weather. For many information security specialists, the half-year mark involves looking at how cyber threats have unfolded since January and d...

Read More

Cyber security as a Service CYBER SECURITY AS A SERVICE

video

Jun 11, 2019

Sourcing and retaining cyber security talent can be as challenging as managing cyber risk itself. In fact, 51% of companies report a severe shortage of cyber security skills. What if you could access strategic and operational expertise without the hassle or expense of employing a full-time cyber sec...

Read More

Vulnerability scanning – in house or third party? VULNERABILITY SCANNING – IN HOUSE OR THIRD PARTY?

article

Jun 10, 2019

You can’t fix the flaws you don’t know about – and the clearer your sense of your organization’s overall security posture, the better equipped you are to improve it. Vulnerability assessments are a core requirement for IT security, and conducting them on a regular basis can h...

Read More

CYBER RISK INSURANCE A Resource Guide for Actuaries CYBER RISK INSURANCE A RESOURCE GUIDE FOR ACTUARIES

whitepaper

May 27, 2019

According to the 2018 Allianz Risk Barometer report, cyber risk is the No. 1 concern for risk managers in the United States. It is a risk that impacts everyone—from individuals to small businesses to large Fortune 100 corporations. As the world continues to become more digital, and more people...

Read More

SIFMA Insights: Spotlight: Building Resilience with a Culture of Cyber Awareness SIFMA INSIGHTS: SPOTLIGHT: BUILDING RESILIENCE WITH A CULTURE OF CYBER AWARENESS

whitepaper

May 07, 2019

There are few industries more prone to the threat of cyber attacks than financial services, as financial institutions move money and work with (and continue to protect) sensitive client data. Firms are constantly assessing the risks and areas of the firm that may be vulnerable. Organizations are mak...

Read More

New Cybersecurity Office to Open in West Virginia NEW CYBERSECURITY OFFICE TO OPEN IN WEST VIRGINIA

article

Apr 11, 2019

Legislation signed by West Virginia Governor creates a new cybersecurity office within the Office of Technology to assess the vulnerabilities of state agencies and unify security policies. The new office has the authority to set standards for cybersecurity and is charged with managing the cybersecur...

Read More

Phishing Education, Training Can Reduce Healthcare Cyber Risk PHISHING EDUCATION, TRAINING CAN REDUCE HEALTHCARE CYBER RISK

article

Apr 04, 2019

The healthcare sector is uniquely vulnerable to phishing attacks, due to high employee turnover and influx of new employees who may lack previous cybersecurity training, according to a new report published in the Journal of the American Medical Association. William Gordon, MD of Harvard Medical Scho...

Read More

Tips To Keep Your Small To Medium-Size Business (SMB’s) Data Safe & Secure TIPS TO KEEP YOUR SMALL TO MEDIUM-SIZE BUSINESS (SMB’S) DATA SAFE & SECURE

article

Mar 20, 2019

With all the data breaches and frauds taking place every day, it’s no secret that new business owners and marketers need to be more aware of the cyber threats that can drastically affect their business as well as personal data. Many business owners think that their data and assets are protecte...

Read More

Cyber Security Incident Response and Reporting Process CYBER SECURITY INCIDENT RESPONSE AND REPORTING PROCESS

article

Mar 19, 2019

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be taken seriously by organizations large and small,...

Read More

Cyber Risk Considerations During the M&A Process CYBER RISK CONSIDERATIONS DURING THE M&A PROCESS

article

Mar 05, 2019

Data breaches are a constant in today’s headlines, but in recent years the risk has been front and center of some of the most significant M&A deals. In 2017, Verizon discounted its acquisition price by $350 million when Yahoo belatedly disclosed that it experienced several massive breaches...

Read More

Growing IT-OT Integration: Addressing the Risks It Brings GROWING IT-OT INTEGRATION: ADDRESSING THE RISKS IT BRINGS

video

Mar 01, 2019

While IT and OT integration has brought about new levels of operational efficiency, it has also introduced serious cyber risks that conventional IT security approaches might fail to address, says IBM Security's Paul Garvey.

Read More

Cybersecurity 101: What You Need To Know About False Positives and False Negatives CYBERSECURITY 101: WHAT YOU NEED TO KNOW ABOUT FALSE POSITIVES AND FALSE NEGATIVES

article

Feb 16, 2019

An Overview of False Positives and False Negatives. Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security. Why? Investigating false positives is a waste of time/resources and d...

Read More

Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns MANAGE EMERGING CYBERSECURITY RISKS BY RALLYING AROUND MUTUAL CONCERNS

article

Feb 04, 2019

Global risks are intensifying but the collective will to tackle them appears to be lacking. — The World Economic Forum’s “Global Risks Report 2019”. With the start of a new calendar year, chief information security officers (CISOs) are looking for ways to set the tone for the...

Read More

MITIGATE CYBER RISK BEFORE, DURING, AND AFTER INCIDENTS MITIGATE CYBER RISK BEFORE, DURING, AND AFTER INCIDENTS

whitepaper

Feb 02, 2019

TRANSFORM YOUR DISASTER RECOVERY SITE INTO A VIRTUAL CYBER RANGE. VM2020 brings cutting-edge technology and cyber resilience content to enterprise risk management to let you realistically simulate the impact, remediation, and recovery from cyber threats – all using existing business continuity...

Read More

UK Enterprises to Compete for £70m in Government Cybersecurity Challenge UK ENTERPRISES TO COMPETE FOR £70M IN GOVERNMENT CYBERSECURITY CHALLENGE

article

Jan 31, 2019

After 40 percent of UK businesses reported data breaches or security incidents in the past year, the government wants to completely “design out” complex cyber risks and attacks. To achieve this and strengthen national infrastructure and consumer security, officials plan to issue an impre...

Read More

Cyber Resilience in the Electricity Ecosystem: Principles and Guidance for Boards CYBER RESILIENCE IN THE ELECTRICITY ECOSYSTEM: PRINCIPLES AND GUIDANCE FOR BOARDS

whitepaper

Jan 24, 2019

Cyber risk is business risk. In the electricity industry, cyber risk is also an ecosystem-wide risk. Cyber resilience is a challenge for all organizations, but it is of particular importance for the electricity ecosystem. A large-scale blackout would have socioeconomic ramifications for households, ...

Read More

6 KEY RISK MANAGEMENT METRICS FOR CONTROLLING CYBER SECURITY 6 KEY RISK MANAGEMENT METRICS FOR CONTROLLING CYBER SECURITY

whitepaper

Jan 24, 2019

The risk of high impact cyber-related breaches continues to be high on the agenda of organisations working across the financial services sector. The FCA’s recent publication of findings from a report on Cyber and Technology Resilience, has communicated a warning that there is “no immedia...

Read More

Reducing Cyber Risk: 5 Tweaks to Your Incident Response Plan REDUCING CYBER RISK: 5 TWEAKS TO YOUR INCIDENT RESPONSE PLAN

article

Jan 22, 2019

An incident response plan is a crucial set of instructions designed to help your IT department—security team at larger companies—properly deal with the slew of network security incidents that can hamper your business at any given moment. Such incidents include (but are not limited to) ra...

Read More

A CIO’s Guide for Reducing Security Anxiety A CIO’S GUIDE FOR REDUCING SECURITY ANXIETY

whitepaper

Jan 21, 2019

As a chief information officer, you know you can’t outsource risk. Yet every year, cyber risk demands more and more time from the already-busy CIO. In this guide, we’ll walk through the following: Why cybersecurity benchmarking is difficult for the modern CIO. Different methods of benchmarking you m...

Read More

Three Quick Wins To Manage and Reduce Your Cyber Risk—Beyond Protection THREE QUICK WINS TO MANAGE AND REDUCE YOUR CYBER RISK—BEYOND PROTECTION

article

Jan 18, 2019

There are plenty of ways to manage (and reduce) your cyber risk beyond the core protection and compliance investments. Here are the three methods of managing cyber risk we find most effective. 1. Detect and Patch Security Vulnerabilities Faster “Known vulnerabilities offer cyber-criminals an e...

Read More

PROTECTING INDUSTRIAL CONTROL SYSTEMS AND SCADA NETWORKS PROTECTING INDUSTRIAL CONTROL SYSTEMS AND SCADA NETWORKS

whitepaper

Jan 18, 2019

Starting with the Industrial Revolution in 18th-Century Manchester, the manufacturing industry has typically undergone a revolution every hundred years. In an age of ever increasing technological advancement, though, times are changing at a faster pace, as we see the era of controller-based automati...

Read More

The Acquired Breach: How to Spot Cyber Risk in Your Acquisition THE ACQUIRED BREACH: HOW TO SPOT CYBER RISK IN YOUR ACQUISITION

article

Jan 16, 2019

Your company just acquired another business and things are great. Your market cap is growing, shareholders are happy, and teams are working hard. Then, you get a call that makes your stomach turn. Your team has uncovered an ongoing breach in the company you just acquired. Your world changes immediat...

Read More

What’s the Answer to the Vulnerability Overload Problem? Key Findings from ESG’s Cyber Risk Management Survey WHAT’S THE ANSWER TO THE VULNERABILITY OVERLOAD PROBLEM? KEY FINDINGS FROM ESG’S CYBER RISK MANAGEMENT SURVEY

whitepaper

Jan 11, 2019

Cyber risk management is demanding work. Vulnerabilities are growing, threat actors are smarter and pressure from the executive team is intensifying. What used to be a side IT conversation is now a top business priority. You finally have the full attention of the C-suite and board – but, do yo...

Read More

Managing Cybersecurity Risk and a Framework for Making Investments MANAGING CYBERSECURITY RISK AND A FRAMEWORK FOR MAKING INVESTMENTS

article

Jan 04, 2019

Everyone agrees that core protection tools are necessary from a risk management and compliance standpoint, but what about adding new programs to reduce your cyber risk? Quantifying your cyber risk is difficult but necessary to establish a prudent financial evaluation and planning process that provid...

Read More

Top 5 Cybersecurity Priorities for 2019: Ponemon Study TOP 5 CYBERSECURITY PRIORITIES FOR 2019: PONEMON STUDY

article

Dec 27, 2018

We asked 2,410 IT and cybersecurity decision-makers in six countries to identify their top cybersecurity and governance priorities for the New Year. Here’s what we learned. What are your top cybersecurity concerns for 2019? Tenable commissioned Ponemon Institute to conduct a survey of 2,410 IT...

Read More

The cyber security landscape for SMEs in 2018 THE CYBER SECURITY LANDSCAPE FOR SMES IN 2018

whitepaper

Dec 20, 2018

Stackhouse Poland have been at the forefront of the Cyber insurance market for a number of years. We acknowledge the size and scope of risk facing UK businesses and, via our established National Practice Group, we have been working to create awareness of cyber risks to our clients and point to poten...

Read More

Join Allen Downs at IBM Think 2019 JOIN ALLEN DOWNS AT IBM THINK 2019

video

Dec 20, 2018

Join Allen Downs, Vice President, IBM Business Resiliency Services, and other IBM experts, industry analysts and clients at the Security & Resiliency campus at IBM Think 2019 to learn about new technologies and practices to mitigate cyber risks.

Read More

MITIGATE CYBER RISK WITH SECURITY PERFORMANCE MANAGEMENT MITIGATE CYBER RISK WITH SECURITY PERFORMANCE MANAGEMENT

infographic

Dec 19, 2018

Businesses need a new weapon in the fight against cybercrime. Despite the best efforts of security teams, spending is up on protection, but with minimal advances to show for it. SPENDING HAS INCREASED ANNUALLY FOR SECURITY. Worldwide spending on information security products and services is forecast...

Read More

How many times have you come to accept a certain “truth” that eventually turned out to be complete fiction? HOW MANY TIMES HAVE YOU COME TO ACCEPT A CERTAIN “TRUTH” THAT EVENTUALLY TURNED OUT TO BE COMPLETE FICTION?

article

Nov 23, 2018

From “the world is flat” to “the Earth is the center of the universe” to “the government would never monitor my emails: these mass beliefs in something that were ultimately proven to be a myth was usually to the detriment of those who refused to accept reality over thei...

Read More

Shifting Left in the Cybersecurity Defense Lifecycle SHIFTING LEFT IN THE CYBERSECURITY DEFENSE LIFECYCLE

article

Nov 20, 2018

Identifying your risk posture should be the first objective of all cybersecurity programs. Yet, this is where organizations often fail, due to weak visibility and understanding during the crucial “identify” phase of the cybersecurity lifecycle. Focusing on protect, detect, respond, recov...

Read More

PRESENTING OT SECURITY RISK TO THE BOARD PRESENTING OT SECURITY RISK TO THE BOARD

whitepaper

Nov 13, 2018

ICS/SCADA and Operational Technology (OT) networks were traditionally kept separate or “air-gapped” from IT networks. However, new business requirements associated with the efficiency benefits of digitalization are forcing increased connectivity between IT and Operational Technology (OT)...

Read More

Cybersecurity in the CONNECTED HOSPITAL CYBERSECURITY IN THE CONNECTED HOSPITAL

infographic

Nov 13, 2018

Abbott conducted in-depth research among physicians and hospital administrators to understand the cybersecurity challenges our hospital customers face. WE SURVEYED: 300 Physicians. 100 Hospital Administrators. WHAT WE FOUND: While physicians and administrators see cybersecurity as a priority, the ma...

Read More

The Future of Financial Stability and Cyber Risk THE FUTURE OF FINANCIAL STABILITY AND CYBER RISK

whitepaper

Oct 07, 2018

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governments on cyber technologies. This paper considers the ways in which cyber risks differ from traditiona...

Read More

HOLIDAY CYBER RISK NuData Security Intelligence Report HOLIDAY CYBER RISK NUDATA SECURITY INTELLIGENCE REPORT

infographic

Oct 03, 2018

Fraudsters use ever-morphing cyber fraud methods over the holidays. NuData’s intelligence supports industry trends that e-commerce is increasingly mobile and high-risk. NuData Security analyzed over 80 billion behavioral events annually. Increased fraud & risk across the board.

Read More

FireEye Named a Leader in Asia Pacific: Pragmatic Cyber Risk Services FIREEYE NAMED A LEADER IN ASIA PACIFIC: PRAGMATIC CYBER RISK SERVICES

video

Aug 08, 2018

Theoretical cyber security best practices look good on paper, but your organization just needs to operate without concern. Pragmatic cyber defenses that have successfully been delivered are the basis for FireEye client satisfaction.

Read More

CYBERMATICSSM CYBERMATICSSM

infographic

Jul 10, 2018

CyberMatics is AIG’s award winning technology-driven process that can help an organization: Verify its cyber risk posture. Prioritize which controls need to change. Better invest in its overall cybersecurity program, which can include the purchase of cyber insurance from an AIG insurer. HOW DO...

Read More

HOW ARE THE C-SUITE FAILING CYBER SECURITY? HOW ARE THE C-SUITE FAILING CYBER SECURITY?

infographic

Jul 09, 2018

Organisations need to protect themselves from cyber-related failures and errors, and malicious cyber-attacks. Too often, cyber risk is being managed solely by IT. However, the risks need to be recognised and addressed by the wider governance and risk management processes that involve other managemen...

Read More

Capture Security Center: Knowledge, Visibility & Control of Your Cyber Security Ecosystem CAPTURE SECURITY CENTER: KNOWLEDGE, VISIBILITY & CONTROL OF YOUR CYBER SECURITY ECOSYSTEM

article

Jun 27, 2018

For many organizations, the fear of being targeted by cybercriminals runs deep, especially as news of the latest high-profile cyberattacks dominate the headlines. Managing security and responding to cyber risks and events are major issues organizations face on a daily basis. In May 2018 alone, the a...

Read More

5G Security Innovation with Cisco 5G SECURITY INNOVATION WITH CISCO

whitepaper

May 17, 2018

5G touches almost every aspect of the way we live our lives. It’s not just about faster, bigger or better, it’s about utilizing 5G as an enabler to a series of services that we all will consume in every aspect of our lives. The time is NOW to consider the security implications and cyber ...

Read More

A preview of the new NIST Cybersecurity Framework A PREVIEW OF THE NEW NIST CYBERSECURITY FRAMEWORK

article

Mar 23, 2018

The NIST Cybersecurity Framework has become the de facto set of guidelines for critical infrastructure organizations to assess information security risk and implement adequate cybersecurity measures to manage risk, while protecting consumer privacy. Since being published in February 2014, the framew...

Read More

The Trends Are In: Cisco’s 2018 Cybersecurity Report THE TRENDS ARE IN: CISCO’S 2018 CYBERSECURITY REPORT

article

Mar 07, 2018

Recently, Cisco published the 2018 Annual Cybersecurity Report providing analysis and insights on the latest security trends and threats across the industry. John N. Stewart, Cisco’s Senior Vice President, Chief Security and Trust Officer captured the highlights in his latest blog, but I wante...

Read More

The evolution of cyber threats THE EVOLUTION OF CYBER THREATS

whitepaper

Mar 04, 2018

Embracing Cyber Risk Management. Across the globe, businesses have become more reliant than ever on technology. Yet with a growing digital footprint, the risk of a business incurring a cyber incident is no longer a question of if, but when. As the digital world evolves, New Zealand businesses must c...

Read More

Small Businesses - Big Targets for Cyberattacks SMALL BUSINESSES - BIG TARGETS FOR CYBERATTACKS

article

Jan 24, 2018

Cybersecurity has become a complex undertaking, but too many small businesses have fallen so far behind the curve that a successful attack could seriously impact them. That level of cyber risk reflects the exposure of modern businesses to email security issues that still mean an entire company can b...

Read More

2018 Cybersecurity Predictions 2018 CYBERSECURITY PREDICTIONS

whitepaper

Jan 08, 2018

Preparing security professionals and business leaders to shift their thinking and manage cyber as an enterprise risk in 2018. Since issuing our 2017 predictions, we’ve seen a dramatic rise in the sophistication, scale, and impact of cyber attacks. As companies strive to enrich their customer e...

Read More

Summary Report on Financial Sector Cybersecurity Regulations, Guidance and Supervisory Practices SUMMARY REPORT ON FINANCIAL SECTOR CYBERSECURITY REGULATIONS, GUIDANCE AND SUPERVISORY PRACTICES

whitepaper

Oct 13, 2017

Cyber attacks are a threat to the entire financial system, a fact that is underscored by recent reports of significant and successful attacks both inside and outside the financial sector. The 2016 attack on the Bangladesh Bank resulted in the theft of $81 million, the WannaCry ransomware attack infe...

Read More

The cybersecurity examination Raising the bar for cyber risk management oversight and reporting THE CYBERSECURITY EXAMINATION RAISING THE BAR FOR CYBER RISK MANAGEMENT OVERSIGHT AND REPORTING

infographic

Jul 04, 2017

The cybersecurity examination Raising the bar for cyber risk management oversight and reporting. With the proliferation of cybercrime and recently proposed legislations related to cyber risk reporting and disclosures, organizations are under intense pressure from stakeholders to respond to inquiries...

Read More

Closing the Cybersecurity Knowledge Gap in the Boardroom CLOSING THE CYBERSECURITY KNOWLEDGE GAP IN THE BOARDROOM

whitepaper

Jun 14, 2017

Many boards have a significant knowledge gap on cyber risk and security. Chief Information Security Officers (CISOs) can bridge that gap by advising board members on this important topic in business terms they readily understand. This paper provides four steps CISOs can take to help boards and busin...

Read More

2017 Global Information Security Workforce Study Benchmarking Workforce Capacity and Response to Cyber Risk 2017 GLOBAL INFORMATION SECURITY WORKFORCE STUDY BENCHMARKING WORKFORCE CAPACITY AND RESPONSE TO CYBER RISK

whitepaper

Jun 07, 2017

Cybersecurity professionals worldwide face an ever-evolving threat landscape that many feel they are ill-equipped to manage. Data breaches at corporations, educational institutions and government agencies continue to erode public confidence in the state of cybersecurity. The emergence of consumer go...

Read More

Strengthening digital society against cyber shocks STRENGTHENING DIGITAL SOCIETY AGAINST CYBER SHOCKS

whitepaper

Jun 07, 2017

Massive cybersecurity breaches have become almost commonplace, regularly grabbing headlines that alarm consumers and leaders. But for all of the attention such incidents have attracted in recent years, many organizations worldwide still struggle to comprehend and manage emerging cyber risks in an in...

Read More

Honeywell Secure Media Exchange (SMX) - Industrial Cyber Security Solution for USB Protection HONEYWELL SECURE MEDIA EXCHANGE (SMX) - INDUSTRIAL CYBER SECURITY SOLUTION FOR USB PROTECTION

video

Mar 28, 2017

Secure Media Exchange reduces cyber security risk and limits operational disruptions by monitoring, protecting, and logging use of removable media throughout industrial facilities. SMX provides plant operators with unprecedented control and visibility into the secure use of USB and removable media b...

Read More

Building Organizational Confidence in Cybersecurity BUILDING ORGANIZATIONAL CONFIDENCE IN CYBERSECURITY

article

Jan 18, 2017

Recently, Tenable Network Security, with research conducted by CyberEdge Group, announced some surprising results from their annual 2017 Tenable Network Security Global Cybersecurity Assurance Report Card. Tenable surveyed 700 security practitioners from nine countries and seven industry verticals t...

Read More

Security Innovation Must Effectively Address Cyber Risks SECURITY INNOVATION MUST EFFECTIVELY ADDRESS CYBER RISKS

article

Jan 06, 2017

Intel launched a new set of 7th Gen Intel® Core™ processors this week, and with them come practical advances in cybersecurity. These advancements are critical at this point in time, as cyber threats lurk around every turn, affecting tech professionals, casual PC users, and everyone in betw...

Read More

Cybersecurity: US Entities are not the only Victims of Cyberattacks CYBERSECURITY: US ENTITIES ARE NOT THE ONLY VICTIMS OF CYBERATTACKS

article

Jan 03, 2017

It seems like Chinese and Russian hackers are ganging up on US businesses, governments, infrastructure and just about any organization. The US attorney general has identified and charged hackers in China. The Obama administration also has charged Russian hackers with interfering with the US election...

Read More

Japanese Government Updates Cybersecurity Guidelines: Increased Focus on Cybersecurity Investments and SMBs JAPANESE GOVERNMENT UPDATES CYBERSECURITY GUIDELINES: INCREASED FOCUS ON CYBERSECURITY INVESTMENTS AND SMBS

article

Dec 22, 2016

The biggest difference between the original and new versions is the revision of the first principle. The 2015 Guidelines urged business executives to take the leadership to determine how much cyber risk to accept and cybersecurity investments to make, despite the near impossibility in calculating re...

Read More

Byline: 4 Key Areas to Consider When Solving the Cybersecurity Talent Gap BYLINE: 4 KEY AREAS TO CONSIDER WHEN SOLVING THE CYBERSECURITY TALENT GAP

article

Dec 21, 2016

Findings from the “2015 PwC US State of Cybercrime Survey” revealed that only 26 percent of those surveyed feel they have the expertise to address the cyber risks associated with the implementation of new technologies. This means that 74 percent of organizations — essentially three...

Read More

Are states ill-equipped to manage cybersecurity? ARE STATES ILL-EQUIPPED TO MANAGE CYBERSECURITY?

article

Dec 16, 2016

While the focus on cybersecurity and cybercrime in government has lately been focused on the federal side, much of the risk lives at the state and local level. That’s where the bad guys can find much of the personal information that makes cybercrime so lucrative, and where disruptive hacks can...

Read More

Global Cybersecurity Confidence Declines GLOBAL CYBERSECURITY CONFIDENCE DECLINES

article

Dec 05, 2016

The newly released 2017 Tenable Network Security Global Cybersecurity Assurance Report Card, with research conducted by CyberEdge Group, updates findings from the 2016 Global Cybersecurity Assurance Report Card. With the addition of France, India and Japan, Tenable surveyed 700 security practitioner...

Read More

Why Yahoo WHY YAHOO'S BREACH COULD TURN THE SEC INTO A CYBERSECURITY TIGER

article

Nov 16, 2016

The U.S. Securities and Exchange Commission (SEC) has 500 million new reasons to examine the rules on when companies must disclose cyber risks and attacks. That's the number of accounts that Yahoo said were hacked in what's being called the largest data breach ever. The company on Sept. 22 b...

Read More

Cybersecurity becoming a key boardroom agenda item CYBERSECURITY BECOMING A KEY BOARDROOM AGENDA ITEM

article

Sep 19, 2016

Cybersecurity becoming a key boardroom agenda item An increase in the number of cyberattacks and growing awareness of the threat has made cybersecurity a key boardroom level agenda item.This is according to a new study from Marsh, which stated that there has been a discernable increase in the unders...

Read More

CAQ: Audit’s role in cyber-security exams CAQ: AUDIT’S ROLE IN CYBER-SECURITY EXAMS

article

Sep 15, 2016

Public company auditors are starting to suggest companies voluntarily submit to an independent cyber-security examination separate from the existing financial statement audit. In a chapter of a 236-page paper by the Internet Security Alliance prepared for its recent conference, the Center for Audit ...

Read More

Cyber Security and Risk Strategy from the Inside-Out CYBER SECURITY AND RISK STRATEGY FROM THE INSIDE-OUT

video

Sep 12, 2016

Bay Dynamics’ CMO, Gautam Aggarwal, sat down with ISMG to discuss effective cyber risk management and how it’s essential for CISOs to have the right visibility in order to understand what employees, strategic business partners, and third-party vendors are doing on the inside and how they...

Read More

Why you should hire good, skilled cybersecurity professionals WHY YOU SHOULD HIRE GOOD, SKILLED CYBERSECURITY PROFESSIONALS

article

Aug 19, 2016

We all know about the various cyberthreats that organizations face today; the highly-sophisticated cybercriminal groups in operation; the new and old variants of malware that are deployed; the well-worn mistakes of the past that we continue to make (like opening phishing emails and inserting infecte...

Read More

Cyber Risk and the Convergence of Operational Risk and Cyber Security CYBER RISK AND THE CONVERGENCE OF OPERATIONAL RISK AND CYBER SECURITY

infographic

Feb 16, 2016

How can financial enterprises gain both resilience and protection when cyber risks are increasing every day? An integrated approach, blending operational risk and cyber security, makes a powerful starting point. For help in integrating these functions High Performance Delivered are trademarks of Acc...

Read More

Who benefits from an ISMS in an organisation? WHO BENEFITS FROM AN ISMS IN AN ORGANISATION?

video

Jul 17, 2015

David Dwyer Cyber Compliance Adviser with Cyber Risk International outlines who benefits in an organisation by having a structured ISMS (Information Security Management System).

Read More

CRI Cyber Security Awareness - Phishing Video CRI CYBER SECURITY AWARENESS - PHISHING VIDEO

video

Mar 16, 2015

Most organizations need some form of security awareness content that meets compliance standards. While many of these organizations choose videos that CRI Cyber Security Awareness Video. Topic Spear Phishing, Phishing and Smishing.

Read More

Symantec cyber-resilience SYMANTEC CYBER-RESILIENCE

infographic

Oct 23, 2014

Internet, Cyber-attacks and threats are becoming more prevalent. This Infographic explains the current state, and things to consider for yourself and your business. A NEW PERSPECTIVE ON SECURITY With this many people online, there are as many risks as benefits to our digital life. In this sophistica...

Read More

How to be prepared for cyber attacks HOW TO BE PREPARED FOR CYBER ATTACKS

whitepaper

Everyone who has been following the news knows how organizations are struggling with their cyber security. Files in organizations and institutions all around the world have been encrypted until ransomware demands are paid. If you are an IT Security Manager, HSSE Manager, or play any role in security...

Read More

Medical Device Cybersecurity Regulatory Oversight & Insurance Considerations MEDICAL DEVICE CYBERSECURITY REGULATORY OVERSIGHT & INSURANCE CONSIDERATIONS

whitepaper

The world of cyber risk continues to develop and expand since our May 2016 paper on Medical Device Cybersecurity.1 The threat of ransomware has come to the forefront as demonstrated by global attacks such as Wannacry2 and Petya.

Read More

Building Resilience to Cyber Risk BUILDING RESILIENCE TO CYBER RISK

whitepaper

Cyber risk has emerged as one of the most important risks facing businesses in the 21st century. In 2009, there were 2.4 million new pieces of malware created. In 2015, more than 430 million new pieces of malware were discovered—over a million new pieces of malware each day.

Read More

Synchronized Security: A Revolution in Threat Protection SYNCHRONIZED SECURITY: A REVOLUTION IN THREAT PROTECTION

whitepaper

Attacks Increase in Number, Complexity, Sophistication All businesses large, small or in-between, must live and learn to thrive in a world with an ever-increasing threat of cyber risks. Those risks are rising for many reasons, from the growing attack surface to the increasing complexity and sophisti...

Read More

Making Risk Management More Effective with Security Ratings MAKING RISK MANAGEMENT MORE EFFECTIVE WITH SECURITY RATINGS

whitepaper

With the growth of cyber threats and the daily reports of security breaches, cyber risk has to be high on your list of priorities for your enterprise. According to Lloyds Risk Index 20131 cyber risk is now the third biggest concern of CEOs and their senior executives, following high taxation and los...

Read More

CYBER RISK: Navigating the Rising Tide of Cybersecurity Regulation CYBER RISK: NAVIGATING THE RISING TIDE OF CYBERSECURITY REGULATION

whitepaper

With hacking and other “cyber incidents” now growing by nearly 40% every year, governments around the world are taking an increasingly active role in defining new requirements for corporate information security. They are passing new legislation, adopting new regulations, and tightening u...

Read More

Understanding Systemic Cyber Risk UNDERSTANDING SYSTEMIC CYBER RISK

whitepaper

Worldwide, people are starting to feel the effects of the dawning Fourth Industrial Revolution, a convergence of technologies that is blurring the lines between the physical, digital and biological worlds in ways that will profoundly affect people and economies around the world. As digital technolog...

Read More

Are You Prepared For A Cyber Attack? ARE YOU PREPARED FOR A CYBER ATTACK?

infographic

As more people and devices connect, the risk and impact of data breaches from malicious cyber attack, system failures and human error will only continue to increase. Recent high profile cyber breaches have revealed how complacency on the part of senior leadership can lead to massive damage to an org...

Read More

Clearwater Cyber Risk Services CLEARWATER CYBER RISK SERVICES

video

A 3-Year Program to Help Hospitals and Health Systems Establish, Implement and Mature Your Cybersecurity Program to Achieve Self-Sufficiency.

Read More

Distributed Denial of Service DISTRIBUTED DENIAL OF SERVICE

infographic

Protection, mitigation and addressing the threat. Your snapshot of cyber risk - Understand the DDoS threat, how to mitigate the risk around it and protect your organisation.

Read More

Cyber security – The Holy Grail for Business Existence and Continuity CYBER SECURITY – THE HOLY GRAIL FOR BUSINESS EXISTENCE AND CONTINUITY

article

It was first talked about as a strong business opportunity. Gartner had predicted that worldwide spending on information security would reach $71.1 billion in 2014. Very quickly, the opportunity turned stronger, but it was now founded on a serious threat. And even before 2015 turned the corner, majo...

Read More

Industrial-Level Intelligence: Stand Up to Industrial Cyber Risks INDUSTRIAL-LEVEL INTELLIGENCE: STAND UP TO INDUSTRIAL CYBER RISKS

infographic

Industrial-Level Intelligence: Stand Up to Industrial Cyber Risks Industrial cyber security risk is on the rise, and reducing it is critical to a company’s operational and production goals. Honeywell Industrial Cyber Security Risk Manager can help companies effectively mitigate and rapidly res...

Read More

How to make the most of the FFIEC Cybersecurity Assessment Tool HOW TO MAKE THE MOST OF THE FFIEC CYBERSECURITY ASSESSMENT TOOL

article

The new Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool (CAT) offers financial institutions something that has been sorely lacking to date—a standardized framework they can use to guide their cybersecurity efforts. Community banks are facing mounting cy...

Read More

Cyber Risk Report 2015 – Executive Summary CYBER RISK REPORT 2015 – EXECUTIVE SUMMARY

whitepaper

The headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers exploit them to penetrate defenses and steal data. The HP Cyber Risk Report 2015 provides a broad overview ...

Read More

Cybersecurity Snapshot for 2016 CYBERSECURITY SNAPSHOT FOR 2016

article

The Information Systems Audit and Control Association (ISACA) surveyed nearly 3,000 IT and cybersecurity professionals from 121 countries about their opinions on several issues, with topics varying from social engineering to recommendations on combating cyber threats to the role governments should p...

Read More

Cyber Security Center of Excellence for government launched in Singapore CYBER SECURITY CENTER OF EXCELLENCE FOR GOVERNMENT LAUNCHED IN SINGAPORE

article

To assist national agencies and operators of critical infrastructure (CI) with their resilience against cyber attacks and malicious service takedowns, professional services organization EY has launched the EY Asean Cyber Security Center for Government and Public Sector in Singapore.The new center of...

Read More

CONCERNS RAISED OVER SOUTH EAST CYBER SECURITY CONCERNS RAISED OVER SOUTH EAST CYBER SECURITY

article

Many small businesses in the South East are "unprepared and unconcerned" by the threat of cyber attacks, a survey published today (9 February 2016) has found.The Business Reputation and the Cyber Risk report launched by Cyber Streetwise and KPMG said 68 per cent of companies in the region ...

Read More

Top 10 Tips for Cyber Resilience TOP 10 TIPS FOR CYBER RESILIENCE

whitepaper

Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

Read More

NIST seeks comments on cybersecurity framework NIST SEEKS COMMENTS ON CYBERSECURITY FRAMEWORK

article

The National Institute of Standards and Technology wants feedback on its voluntary Framework for Improving Critical Infrastructure Cybersecurity.The framework, published in 2014, includes standards, guidelines and practices that help organizations address cyber risks by aligning policy, business and...

Read More

In 2015, we will be talking about cyber security a lot more IN 2015, WE WILL BE TALKING ABOUT CYBER SECURITY A LOT MORE': CYBER RISK MOVING UP THE IN-HOUSE AGENDA

article

General counsel (GC) are increasingly involved in handling cyber security issues at board level, reflecting a more comprehensive shift towards effective risk management, research from Legal Business and PwC has revealed.In a survey of corporate attitudes to cyber security risk this autumn, which gar...

Read More

Cyber crime: the latest big threat to insurers on the rise CYBER CRIME: THE LATEST BIG THREAT TO INSURERS ON THE RISE

article

The prophets of doom are doing a roaring trade. The latest subject of apocalyptic predictions for the western way of life is cyber security. It seems that everyone is interested in the contents of your computer systems, and increasingly, in damaging these systems to make your life and your business ...

Read More

Vendor Risk and Business Impact Infographic VENDOR RISK AND BUSINESS IMPACT INFOGRAPHIC

whitepaper

The vendor community is critical to business operations and success. Organizations issue vendors with legitimate user accounts and access to key resources. Cybercriminals have started leveraging the trusted vendor network and access these vendors have into organizations, as a threat vector to carry ...

Read More

Converge or Collide? Time for Legal and Compliance Staff to Tune into Cyber Risk Management CONVERGE OR COLLIDE? TIME FOR LEGAL AND COMPLIANCE STAFF TO TUNE INTO CYBER RISK MANAGEMENT

whitepaper

As data breaches dominate newsrooms and board rooms pressure on attorneys and compliance staff to develop information security management programs has reached unprecedented levels. Yet, traditional siloed infrastructures can inhibit collaboration between information security and legal, which is crit...

Read More

The Cyber Threat Risk – Oversight Guidance for CEOs and Boards THE CYBER THREAT RISK – OVERSIGHT GUIDANCE FOR CEOS AND BOARDS

whitepaper

The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government ...

Read More

Emerging challenges in electric grid cybersecurity EMERGING CHALLENGES IN ELECTRIC GRID CYBERSECURITY

article

For years, policymakers have been concerned about a catastrophic cyberattack that could disrupt the electric grid, causing widespread power outages and impacting national security, the economy and public safety. As electric utilities and the government grapple with the myriad of cybersecurity challe...

Read More

The Evolution Of Cyber Risk THE EVOLUTION OF CYBER RISK

infographic

Cyber attacks or data breach incidents seem to make headlines daily. Although these events may feel commonplace, their triggers are changing, as are the risk management strategies to address them. ACE has handled data breach incidents and underwritten exposures for policyholders for more than 15 yea...

Read More

Cyber Risks Implications for the Insurance Industry in Canada CYBER RISKS IMPLICATIONS FOR THE INSURANCE INDUSTRY IN CANADA

whitepaper

Canada is one of the most wired countries in the world. Statistics Canada reports that in 2013, 89 percent of Canadian businesses used the Internet, and nearly every enterprise used some form of information technology.6 The Canadian Internet Registration Authority found that 87 percent of Canadian h...

Read More

Managing cyber risks in an interconnected world MANAGING CYBER RISKS IN AN INTERCONNECTED WORLD

whitepaper

It is no longer an issue that concerns only information technology and security professionals; the impact has extended to the C-suite and boardroom. Awareness and concern about security incidents and threats also has become top of mind among consumers as well. In short, few risk issues are as all-en...

Read More

Cybersecurity is a Business Issue: Enabling Execs to Communicate with the Board CYBERSECURITY IS A BUSINESS ISSUE: ENABLING EXECS TO COMMUNICATE WITH THE BOARD

whitepaper

Business executives have been traditionally concerned with revenue, market share, competitive threats, expenses and economic indicators. Today, inundated with frequent headlines about high profile security breaches, cyber risk has joined their list of concerns. Executives need to know if their organ...

Read More

2015 Network Security & Cyber Risk Management 2015 NETWORK SECURITY & CYBER RISK MANAGEMENT

whitepaper

If risk managers, senior executives and board members of European organisations had any doubt as to the existence of a data security epidemic, the past year likely changed that. With massive data breaches affecting some of the world’s biggest companies, nation-states using the cyber realm as a...

Read More

Cyber Security Research - Cyber Risk Report 2015 CYBER SECURITY RESEARCH - CYBER RISK REPORT 2015

whitepaper

Welcome to the HPE Cyber Risk Report 2015. In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things.

Read More

"ENHANCING RESILIENCE THROUGH CYBER INCIDENT DATA SHARING AND ANALYSIS" "ENHANCING RESILIENCE THROUGH CYBER INCIDENT DATA SHARING AND ANALYSIS"

whitepaper

"This paper outlines the potential benefits of a trusted cyber incident data repository that enterprise risk owners and insurers could use to anonymously share, store, aggregate, and analyze sensitive cyber incident data. Optimally, such a repository could enable a novel information sharing capabili...

Read More

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance CYBERSECURITY AND THE C-SUITE: HOW EXECUTIVES CAN UNDERSTAND CYBER RISKS AND ENSURE GOVERNANCE

whitepaper

As cybercrime events have increasingly impacted organizations, cybersecurity has transformed from just an IT problem into a strategic issue where the C-Suite must take ownership. However, many executives and board members lack key knowledge about the cyber risks their organizations face and how to i...

Read More

Hacktivism and Encryption at the Forefront of Cyber-Attacks HACKTIVISM AND ENCRYPTION AT THE FOREFRONT OF CYBER-ATTACKS

whitepaper

In August 2015 the Healthcare sector received a risk score equal to its six ­month average, indicating that the sector experienced the normal level of cyber risk for the month. As usual, most of the incidents that occurred during the month affected the Healthcare Facilities and Services group. It is...

Read More

Cyber Risk Report: DDoS Attacks Target Financial Organizations CYBER RISK REPORT: DDOS ATTACKS TARGET FINANCIAL ORGANIZATIONS

whitepaper

"In August 2015 the Financials sector received a risk score that was below the sector's six­ month average, indicating a decrease from the usual level of risk.Banks were once again the top trending subgroup within the sector as several banks experienced distributed denial­-of-­service attacks that l...

Read More

CYBER RISK – A GLOBAL SYSTEMIC THREAT CYBER RISK – A GLOBAL SYSTEMIC THREAT

whitepaper

"While DTCC is primarily concerned about risks that can affect the stability and integrity of the financial systemit supports, it recognizes that the scope of cyber risks extends well beyond the financial world. By their nature, cyber threats cannot be addressed in isolation – they are multi-faceted...

Read More

Cyber Risk: Threat and opportunity CYBER RISK: THREAT AND OPPORTUNITY

whitepaper

"Interest in cyber insurance and risk has grown beyond expectations in 2014 and 2015 as a result of high profile data breaches, including a massive data breach at health insurer Anthem that exposed data on 78.8 million customers and employees and another at Premera Blue Cross that compromised the re...

Read More

Cyber security research—HP Cyber Risk Report 2015 CYBER SECURITY RESEARCH—HP CYBER RISK REPORT 2015

whitepaper

"HP Security Research (HPSR) conducts innovative research in multiple focus areas. We deliver security intelligence across the portfolio of HP security products including HP ArcSight, HP Fortify, and HP TippingPoint. In addition, our published research provides vendor-agnostic insight and informatio...

Read More

3 Strategies for Continuous Risk Management 3 STRATEGIES FOR CONTINUOUS RISK MANAGEMENT

whitepaper

"With the growth in the number and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of the most significant risks that organizations face. Many businesses spend millions of dollars annually on people, processes, and technologies to protect themse...

Read More

2014 Network Security & Cyber Risk Management 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT

whitepaper

The vast majority of risk professionals, senior executives and board members in the Asia-Pacific region acknowledge that network and information security risks are a threat to their organisations. Most consider the exposures as serious enough to be made the focus of specific risk management activiti...

Read More

NIST FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY NIST FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY

whitepaper

Following an Executive Order issued by President Obama in February 2013 (Executive Order 13636, Improving Critical Infrastructure Cybersecurity) the National Institute of Standards and Technology (NIST) worked with stakeholders to develop a voluntary framework for reducing cyber risks to critical in...

Read More

Information Security Cyber Liability Risk Management INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT

whitepaper

Historians may look at the year 2013 as a sort of cyber tipping-point – the point at which businesses and governments finally realized the severity of the threats they were facing. Revelations about the NSA’s cyber espionage program, evidence of theft of business intellectual property by...

Read More

McAfee Guide to Implementing the 10 Steps to Cyber Security MCAFEE GUIDE TO IMPLEMENTING THE 10 STEPS TO CYBER SECURITY

whitepaper

This solution brief represents our ideas for improving cyber resilience and security posture through implementation of the CESG’s 10 Steps to Cyber Security. While this guide does not address all areas of security or cyber defence requirements, it does provide proven cyber risk reduction steps...

Read More

Managing Cyber Risk: Are Companies Safeguarding Their Assets? MANAGING CYBER RISK: ARE COMPANIES SAFEGUARDING THEIR ASSETS?

whitepaper

In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage. The financial losses and, worse, often irreparable reputational harm such incidents wreak have served to place a target squarely on the backs of board membe...

Read More

A Resource Guide for BANK EXECUTIVES Executive Leadership of Cybersecurity A RESOURCE GUIDE FOR BANK EXECUTIVES EXECUTIVE LEADERSHIP OF CYBERSECURITY

whitepaper

Cyber risks, like reputational and financial risks, have the ability to affect a bank’s bottom line. It can be costly, compromising to customer confidence, and, in some cases, the bank could be held legally responsible. Beyond the impact to an individual bank, cyber risks have far-reaching eco...

Read More

The NIST Cybersecurity Framework: What You Need to Know THE NIST CYBERSECURITY FRAMEWORK: WHAT YOU NEED TO KNOW

video

The NIST Cybersecurity Framework, released on February 12th, is the culmination of a year-long collaboration between owners and operators of critical infrastructure and the federal government to standardize cyber risk management

Read More

HP Cyber Risk Report 2015: Executive Summary HP CYBER RISK REPORT 2015: EXECUTIVE SUMMARY

whitepaper

"The headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers exploit them to penetrate defenses and steal data.The HP Cyber Risk Report 2015 provides a broad over...

Read More

HP Security Research: Cyber Risk Report HP SECURITY RESEARCH: CYBER RISK REPORT

whitepaper

"Today's cyber world is an evolving landscape of known vulnerabilities and exploits coupled with new threats brought by new technologies. Security professionals must learn to protect their businesses from both.The HP Cyber Risk Report 2015 brings the information you need to do that. This co...

Read More

A Guide to Cyber Risk A GUIDE TO CYBER RISK

whitepaper

In this A Guide to Cyber Risk: Managing the impact of increasing interconnectivity – specialist insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe. Cyber risk is a major and fast-increasing threat to businesses ...

Read More

Cyber Risk Intellegence for Credit Unions CYBER RISK INTELLEGENCE FOR CREDIT UNIONS

whitepaper

Today, the media is full reports detailing data breaches of well- known organizations. However, corporations are not the only targets of cyber-attacks. Credit unions offer many of the same services as commercial banks, yet lack the same data protection resources. This white paper outlines how credit...

Read More

Cyber Threat Intelligence You Can Immediately Understand and Use CYBER THREAT INTELLIGENCE YOU CAN IMMEDIATELY UNDERSTAND AND USE

whitepaper

The common approach to threat intelligence is to turn on a fire hose of low-level machine-driven data, but this often creates more confusion and more data that is useless for your business. How can you better manage and leverage this cyber data so that you can better equip your business against cybe...

Read More

Information Security and Cyber Liability Risk Management INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT

whitepaper

As awareness grows due to media coverage of high profile data breaches, pending cyber legislation and continued advisories from cyber security professionals, information security and other cyber risks continue to represent at least a moderate threat to a majority of risk professionals. Board Members...

Read More

Risk Report: Hacktivism and Encryption at the Forefront of Cyber-Attacks RISK REPORT: HACKTIVISM AND ENCRYPTION AT THE FOREFRONT OF CYBER-ATTACKS

whitepaper

Every day, hackers manage to steal and leak contact information of various companies employees as well as knock their website offline with DDoS attacks. Unencrypted laptops continue to be an easy route in. Ignoring this issue will only lead to data theft/loss. This white paper illustrates the latest...

Read More

ESG Brief: Utilizing Security Ratings for Enterprise IT Risk Mitigation ESG BRIEF: UTILIZING SECURITY RATINGS FOR ENTERPRISE IT RISK MITIGATION

whitepaper

"In this ESG Brief, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the enterprise need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.Download this paper to learn how Security Ratings a...

Read More

U.S. urged to tighten cyber security to counter Chinese hacking U.S. URGED TO TIGHTEN CYBER SECURITY TO COUNTER CHINESE HACKING

article

The United States must beef up cyber security against Chinese hackers targeting a broad range of U.S. interests to raise the cost to China of engaging in such activities, America's top intelligence official said on Thursday.The testimony by Director of National Intelligence James Clapper before ...

Read More

Managing Cyber Risk Are Companies Safeguarding Their Assets MANAGING CYBER RISK ARE COMPANIES SAFEGUARDING THEIR ASSETS

whitepaper

In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage. The financial losses and, worse, often irreparable reputational harm such incidents wreak have served to place a target squarely on the backs of board membe...

Read More

ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation ESG BRIEF UTILIZING SECURITY RATINGS FOR ENTERPRISE IT RISK MITIGATION

whitepaper

In this ESG Brief, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the enterprise need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.

Read More

Cyber security - confidence in your digital future CYBER SECURITY - CONFIDENCE IN YOUR DIGITAL FUTURE

video

PwC's Richard Horne, Partner in Cyber Security, discusses the management of cyber risk and its fundamental part of business management.

Read More

Critical Infrastructure: Better Cybersecurity Metrics Needed CRITICAL INFRASTRUCTURE: BETTER CYBERSECURITY METRICS NEEDED

article

"Until SSAs (sector-specific agencies) develop performance metrics and collect data to report on the progress of their efforts to enhance the sectors' cybersecurity posture, they may be unable to adequately monitor the effectiveness of their cyber risk mitigation activities and document the...

Read More

Network Security and Privacy NETWORK SECURITY AND PRIVACY

whitepaper

The digital revolution raises new cyber risk concerns that can significantly affect an entity’s financial statements.Because corporate directors and officers have a fiduciary duty to protect their company’s assets—including digital assets themselves as well as the stock prices that...

Read More

Cybersecurity in the Oil and Gas Industry. CYBERSECURITY IN THE OIL AND GAS INDUSTRY.

whitepaper

Documented attacks that have historically targeted and damaged energy company IT systems have left OT systems largely unharmed. As operations becomes more integrated with IT systems in support of situational awareness, improved production performance and remote support capabilities the cyber risk ap...

Read More

Finance Plays Critical Role in Mitigating Cyber Security Risks FINANCE PLAYS CRITICAL ROLE IN MITIGATING CYBER SECURITY RISKS

article

CFOs and their finance teams are toughening policies on suppliers and increasing insurance coverage as they are asked take on a larger role in defending their companies from emerging cyber risks, according to a new survey of Chartered Global Management Accountant® (CGMA®) designation holders...

Read More

What is an ISMS Information Security Management System? WHAT IS AN ISMS INFORMATION SECURITY MANAGEMENT SYSTEM?

video

David Dwyer Cyber Compliance Adviser with CRI Cyber Risk International outlines what exactly an ISMS is. An ISMS is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process. It can he...

Read More

Managing Cyber Risk Are Companies Safeguarding Their Assets? MANAGING CYBER RISK ARE COMPANIES SAFEGUARDING THEIR ASSETS?

whitepaper

In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyber attacks and corporate espionage. The financial losses and, worse, often irreparable reputational harm such incidents wreak have served to place a target squarely on the backs of board memb...

Read More

Why Cybersecurity and a Cybersecurity Degree Matter? WHY CYBERSECURITY AND A CYBERSECURITY DEGREE MATTER?

video

When it comes to cyber risks, no individual, industry, organization or country is immune. While a national power grid or global financial institution breach could be devastating, think about just your home computer and the amount of sensitive information you have stored on it – income tax file...

Read More

Proactively manage the cyber security landscape PROACTIVELY MANAGE THE CYBER SECURITY LANDSCAPE

video

In today's technology-driven environment, your organisation faces complex challenges. Leadership needs a new perspective to help take control of cyber security, focusing on the areas that matter most. At KPMG, we believe in proactively incorporating cyber risk management into all activities. Cyb...

Read More

Cybersecurity Protection Helps Capital Markets Keep Up with Threats CYBERSECURITY PROTECTION HELPS CAPITAL MARKETS KEEP UP WITH THREATS

infographic

According to data collected by CDW for a post on FinTalk blog, stock exchanges, broker-dealers and advisers have all fallen victim to cyberattacks. In fact, hackers have stolen 500 million financial records over the past 12 months, costing firms an average of $200 per record. some financial services...

Read More

Motorola Solutions Offers Cybersecurity Professional Services to Govt, Public Safety Sector MOTOROLA SOLUTIONS OFFERS CYBERSECURITY PROFESSIONAL SERVICES TO GOVT, PUBLIC SAFETY SECTOR

article

Motorola Solutions has unveiled its new Cybersecurity Professional Services offering that works to help government and public safety customers address cyber risks and respond to attacks as they perform their missions.The company said Thursday the service can supplement network security monitoring an...

Read More

Cyber Risk Report 2015 CYBER RISK REPORT 2015

infographic

Understand the evolving threat landscape. Get the data you need with this informative infographic. This one-page summary of the findings provides an at-a-glance view you can share with colleagues to make your case for enhanced cyber security.

Read More

Cybersecurity in Latin America CYBERSECURITY IN LATIN AMERICA

article

What is the current situation regarding cybersecurity in Latin America? To answer this question, I turned to Mr. Carter Schoenberg, who is a respected industry security expert who recently started a cybersecurity company in Panama. Here’s the informative interview.What are the important cybers...

Read More

2015 CISO Insights Study Managing Your Cybersecurity Investment 2015 CISO INSIGHTS STUDY MANAGING YOUR CYBERSECURITY INVESTMENT

whitepaper

A few years ago most firms would manage cybersecurity and make investment decisions based mainly on industry best practices, resulting in their adopting certain technologies, policies and practices, without a detailed understanding of their specific overall cyber risk situation. As a result, very fe...

Read More

IS ANYBODY OUT THERE USING THE CYBERSECURITY FRAMEWORK? PLEASE TELL NIST!! IS ANYBODY OUT THERE USING THE CYBERSECURITY FRAMEWORK? PLEASE TELL NIST!!

article

Anybody have an opinion on the NIST’s new, improved ways of beefing up cybersecurity? The National Institute of Standards and Technology is seeking feedback on how its “Framework for Improving Critical Infrastructure Cybersecurity” is being used. Developed in response to a February...

Read More

5 information security trends that will dominate 2016 5 INFORMATION SECURITY TRENDS THAT WILL DOMINATE 2016

article

Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2016, information security professionals must understand these five trends.Every year, it seems, the threats posed by cybercriminals evolve into new and more dangerous forms while securit...

Read More

Cybersecurity Startup QuadMetrics Calculates Odds a Company Will be Breached CYBERSECURITY STARTUP QUADMETRICS CALCULATES ODDS A COMPANY WILL BE BREACHED

article

QuadMetrics Inc. says it can predict with greater than 90% accuracy the likelihood that a company will be breached within the next year.While one customer says the young company’s technology is still maturing, its prediction efforts represent an emerging capability in the fight against cybercr...

Read More

EU agency warns of cyber risks from using big data tools EU AGENCY WARNS OF CYBER RISKS FROM USING BIG DATA TOOLS

article

The European Network and Information Security Agency (ENISA) urged companies to embrace "the security-by-default principle" to better safeguard data and systems against privacy and security risks."Big data applications can provide a dramatic increase in the efficiency and effectivenes...

Read More

2015 CISO Insights Study: Managing Your Cybersecurity Investment 2015 CISO INSIGHTS STUDY: MANAGING YOUR CYBERSECURITY INVESTMENT

whitepaper

A few years ago most firms would manage cybersecurity and make investment decisions based mainly on industry best practices, resulting in their adopting certain technologies, policies and practices, without a detailed understanding of their specific overall cyber risk situation. As a result, very fe...

Read More

Under cyber attack EY’s Global Information Security Survey 2013 UNDER CYBER ATTACK EY’S GLOBAL INFORMATION SECURITY SURVEY 2013

whitepaper

Cyber security attacks have increased exponentially in the last few years. Every day, as the rapid-fire evolution of technology marches forward, new, more complex cyber risks emerge, threatening significant harm to an organization’s brand and bottom line

Read More

Cyber insurance, security and data integrity CYBER INSURANCE, SECURITY AND DATA INTEGRITY

whitepaper

This is the first in a two-part series on cybersecurity that focuses on both the data and risk aspects of this topic. It provides a broad view of why information security and cyber risk are so important for insurance companies and how they can protect their businesses from rapidly emerging threats

Read More

CYBER RISKS: THE GROWING THREAT CYBER RISKS: THE GROWING THREAT

whitepaper

The cyber risk landscape is evolving rapidly in a multitude of areas. Governments are facing an unprecedented level of cyber attacks and threats with the potential to undermine national security and critical infrastructure, while businesses that store confidential customer and client information onl...

Read More

Cybersecurity and the C-Suite How Executives Can Understand Cyber Risks and Ensure Governance CYBERSECURITY AND THE C-SUITE HOW EXECUTIVES CAN UNDERSTAND CYBER RISKS AND ENSURE GOVERNANCE

whitepaper

As cybercrime events have increasingly impacted organizations, cybersecurity has transformed from just an IT problem into a strategic issue where the C-Suite must take ownership. However, many executives and board members lack key knowledge about the cyber risks their organizations face and how to i...

Read More

Big Data, Big Mess Sound Cyber Risk Intelligence through Complete Context BIG DATA, BIG MESS SOUND CYBER RISK INTELLIGENCE THROUGH COMPLETE CONTEXT

whitepaper

When it comes to cybersecurity, perhaps nothing has been as highly touted as the answer to every executive's prayers as big data. It makes sense. Cybercrime, being inherently technical, can provide vast droves of data to be analyzed, and for years the drum has been beaten that big data will chan...

Read More

CRI Cyber Security Awareness CRI CYBER SECURITY AWARENESS

video

CRI Cyber Security Awareness Video. Topic Spear Phishing, Phishing and Smishing.

Read More



SPOTLIGHT

Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can't expect to adequately protect data if they don't have knowledge about what data exists, where it resides, its value to the o

RESOURCES