Finding Persons of Interest Across the Global Enterprise

Fraudsters constantly change their identification information to try to keep a step ahead of investigators. Even with the massive amounts of evidentiary data that exists, global financial institutions face many obstacles in pinpointing persons and businesses of interest.

Spotlight

ThirdPartyTrust

ThirdPartyTrust’s SaaS vendor risk management platform simplifies assessments of third and fourth party vendors. By analyzing vendor cyber risk using a network-based solution, trust is built and mapped within the vendor eco-system. Enterprises simply invite their vendors (e.g. IT service providers, consultants and contractors) to create a ThirdPartyTrust profile, which can include security audits, insurance certificates and compliance documentation. Enterprises then perform their assessments using the collaborative platform simplifying the process through automation and real-time tools.

OTHER WHITEPAPERS
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More
news image

DeltaV SIS™ and Cybersecurity

whitePaper | November 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for cybersecurity as well as the built-in security features available within the DeltaV SIS process safety system.

Read More
news image

Darktrace Cyber AI Analyst: Autonomous Investigations

whitePaper | February 9, 2023

This white paper examines the technology and design principles behind Darktrace's Cyber AI Analyst, a groundbreaking innovation that automates threat investigations at speed and scale.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Cyber Threat Predictions for 2023

whitePaper | November 3, 2022

While “less is more” is the critical strategy behind consolidating networks and security, “more is more” seems to be the mantra cybercriminals continue to live by. The most troubling trend we’ve observed across the cyber landscape is one we see continuing into the future—that threats of all kinds are becoming increasingly ubiquitous. From Ransomware-as-a-Service (RaaS) to new attacks on nontraditional targets like edge devices to the emerging use of wipers, the volume and variety of cyberthreats will keep security teams on their toes in 2023 and beyond.

Read More
news image

Cybersecurity in the Cloud White Paper

whitePaper | July 1, 2023

Cloud services have changed the face of business, offering scalability, efficiency and cost savings not available with onpremises IT infrastructure. The cloud makes it easier for organizations to manage the ever-increasing amount of data passing through their systems, helping teams communicate and collaborate across different locations. By enhancing the ability to access and manage information, the cloud has introduced a new way of approaching productivity and security – and has transformed how we work.

Read More

Spotlight

ThirdPartyTrust

ThirdPartyTrust’s SaaS vendor risk management platform simplifies assessments of third and fourth party vendors. By analyzing vendor cyber risk using a network-based solution, trust is built and mapped within the vendor eco-system. Enterprises simply invite their vendors (e.g. IT service providers, consultants and contractors) to create a ThirdPartyTrust profile, which can include security audits, insurance certificates and compliance documentation. Enterprises then perform their assessments using the collaborative platform simplifying the process through automation and real-time tools.

Events