The Significance of Information Security and Privacy Controls on Law

As regulators increase pressure on financial institutions to ensure their third party risk management programs meet new regulations and guidelines, including those for cybersecurity, many banks are more closely scrutinizing third party provider handling of sensitive information to ensure objective and compliant oversight of their vendors.1 Additional pressure is being placed globally on third party controls as criminals increasingly use malicious intrusions and cyber attacks to target third party service providers as a means of accessing confidential client data.

Spotlight

n.runs AG

n.runs professionals was founded in 2001 as a competent provider of manufacturer-independent IT.Security, IT.Infrastructure, IT.Business Consulting services and offers additionally a highly efficient Security as a Service named n.sure. All of our specifically targeted services are provided according to an integrated approach which involves assessments, audits and design, support in the use of innovative technologies and process consulting. We also transfer our know-how to our customers because we view them as our long-term partners.

OTHER WHITEPAPERS
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

How to Prepare For & Respond to Ransomware in Operational Technology Environments

whitePaper | March 14, 2023

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Read More
news image

The State of Ransomware in Manufacturing and Production 2022

whitePaper | October 6, 2022

Sophos' annual study of the real-world ransomware experiences of IT professionals in the manufacturing and production sector has revealed an ever more challenging attack environment. Together with the growing financial and operational burden ransomware places on its victims, it also shines new light on the relationship between ransomware and cyber insurance - including how insurance drives changes to cyber defenses.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More

Spotlight

n.runs AG

n.runs professionals was founded in 2001 as a competent provider of manufacturer-independent IT.Security, IT.Infrastructure, IT.Business Consulting services and offers additionally a highly efficient Security as a Service named n.sure. All of our specifically targeted services are provided according to an integrated approach which involves assessments, audits and design, support in the use of innovative technologies and process consulting. We also transfer our know-how to our customers because we view them as our long-term partners.

Events