6 KEY RISK MANAGEMENT METRICS FOR CONTROLLING CYBER SECURITY

January 24, 2019

The risk of high impact cyber-related breaches continues to be high on the agenda of organisations working across the financial services sector. The FCA’s recent publication of findings from a report on Cyber and Technology Resilience, has communicated a warning that there is “no immediate end in sight to the escalation in tech and cyber incidents that are affecting UK financial services”. However, managing cyber risk effectively is a complex operation that requires organisations to adopt a multidisciplinary and multifunctional approach to ensure that all aspects of cyber risk are effectively monitored.

Spotlight

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations. The System increases productivity and reduces the associated business costs of connecting to the Internet through the effective management and control of the company Internet connection. An integral feature of the Mako System is the hosted central management platform that allows remote management, delivers proactive security and feature updates and provides comprehensive reports.

OTHER WHITEPAPERS
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

Amplify Your Ransomware Defenses: Protect, Detect and Recover

whitePaper | December 28, 2022

The Cohesity platform provides exceptional value for organizations to protect and manage vast enterprise data stores. But cyber criminals target data stores for various nefarious activities, most notably ransomware and data theft. Ransomware continues as the leading threat as it provides easy monetization, and therefore cyber criminals work non-stop to compromise organizations.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

C2 Password Security White Paper

whitePaper | November 24, 2022

In recent years, the necessity to create and maintain dozens or hundreds of online accounts with logins and passwords has become more and more prominent, especially with remote work on the rise and internet usage at an all-time high. Nothing is more secure than making sure that every one of your accounts that you create is using a unique or randomly generated password, but where do you keep track of all of these passwords, and how can you ensure that your password security is up to par?

Read More
news image

Security, privacy, and compliance with Illumina Connected Analytics

whitePaper | August 23, 2022

Advances in next-generation sequencing (NGS) technologies have dramatically increased the amount of data generated, creating challenges in data analysis and interpretation. Illumina Connected Analytics (ICA) is a secure genomic data platform to operationalize informatics and drive scientific insights. ICA provides an extensible platform with a rich set of RESTful application program interfaces (APIs) and a command-line interface (CLI) tool to maximize workflow efficiency.

Read More

Spotlight

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations. The System increases productivity and reduces the associated business costs of connecting to the Internet through the effective management and control of the company Internet connection. An integral feature of the Mako System is the hosted central management platform that allows remote management, delivers proactive security and feature updates and provides comprehensive reports.

Events