2014 Network Security & Cyber Risk Management

The vast majority of risk professionals, senior executives and board members in the Asia-Pacific region acknowledge that network and information security risks are a threat to their organisations. Most consider the exposures as serious enough to be made the focus of specific risk management activities. However, under one third of organisations surveyed currently purchase insurance as part of their cyber risk management strategy"

Spotlight

Tresys Technology

Tresys provides innovative solutions to hard problems in cross domain, deep content inspection, file sanitization, SELinux, mobile devices and OSs, and assured information sharing. Known for years as THE SELinux security experts, Tresys is also the go-to resource for innovative solutions in these areas. Our knowledge of secure design, certification & accreditation, software development on secure OSs, COTS, and custom hardware, sets us apart and enables unique insight into today's complex solutions. Tresys views information assurance as a key mission-enabler, from core-to-edge, and is building game-changing technologies that help customers increase security while lowering TCO.

OTHER WHITEPAPERS
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More
news image

Cybersecurity Services

whitePaper | October 17, 2022

Our approach to cybersecurity includes a holistic set of services spanning Risk Assessments, Security Patching, Advisory Services and Managed Detection and, Response (MDR).

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Cybersecurity and Financial SystemResilience Report

whitePaper | July 27, 2022

The Consolidated Appropriations Act, 20211 (CAA) requires the Federal Reserve Board (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.

Read More
news image

Guide to Cloud Security Posture Management Tools

whitePaper | June 16, 2023

Good cloud security hygiene starts with complete visibility into the security and compliance posture of every resource you deploy into your cloud. It’s one thing to achieve this visibility in a single cloud environment—you can lean heavily on the native monitoring and auditing tools of your cloud provider, using third-party solutions to fill in gaps (e.g., threat detection)—but in a multi-cloud architecture, maintaining robust cloud security posture becomes exponentially more complex. It is much more difficult to achieve centralized visibility as well as consistently enforce policies and compliance rules within a multi-cloud environment. It’s also more complicated to detect threats and fix vulnerabilities quickly due to the sheer complexity of threats across distributed, multilayered architectures. You can address these challenges, though—and you need to, if you want to take advantage of multi-cloud architecture without compromising on security.

Read More
news image

Security Challenges for the Energy Industry on the Industrial Internet of Things

whitePaper | November 4, 2022

The Industrial Internet of Things (IIoT) is a relatively new computing paradigm that combines machine learning (ML), artificial intelligence (AI), remote sensors, and device-control applications (or “apps”) to help businesses and industry achieve more efficient and reliable operations. In the oil and gas field, IIoT is used for a variety of purposes—from fully autonomous pump and valve control to remote sensing of security breaches at isolated wellsites.

Read More

Spotlight

Tresys Technology

Tresys provides innovative solutions to hard problems in cross domain, deep content inspection, file sanitization, SELinux, mobile devices and OSs, and assured information sharing. Known for years as THE SELinux security experts, Tresys is also the go-to resource for innovative solutions in these areas. Our knowledge of secure design, certification & accreditation, software development on secure OSs, COTS, and custom hardware, sets us apart and enables unique insight into today's complex solutions. Tresys views information assurance as a key mission-enabler, from core-to-edge, and is building game-changing technologies that help customers increase security while lowering TCO.

Events