Enterprise Risk Management and the Value of a Centralized, Consistent Approach to Managing Risk
In 2020, “public companies with mature enterprise risk management programs found that their ERM framework paid off during the pandemic” (...)
Global consultancy Deloitte stated in a recent article that “phishing is the number one delivery vehicle for ransomware”. (...)
Recently, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued an updated advisory that warns against paying out ransomware demands (...)
Security breaches through third parties have become increasingly common, as hackers seek entry points to an enterprise’s information. How can you protect yourself? This blog offers a systematic approach to vendor risk.
Cyber security has become an increasingly important issue for organizations in every sector. But one of the most attractive and [Read more...]
According to Gartner, Dynamic Risk Governance is the new mandate and organisations need to get better at managing risk holistically. Furthermore, [Read more...]
With such dramatic changes in business operations caused by the pandemic, corporations are increasingly relying on their CISOs to manage [Read more...]
Read this blog to learn why financial institutions should aim to strengthen cybersecurity by focusing on risk.
Effective risk management needs everyone to play their part - both the back office and the front office. Read this blog to find out how you can engage different stakeholders with IRM.
Following our recent blog, Our cyber risk predictions of 2020: What effect did Covid-19 have?, we now look ahead to this year, one that we hope will be less turbulent and more productive for all.
The year 2020 has been like no other, with Covid-19 having devastating, profound effects. When it comes to cybersecurity, the [Read more...]
Businesses face risks on many fronts, particularly in cybersecurity, for which Gartner predicts spending will grow by 2.4% in 2020 despite the [Read more...]
To reassure themselves and their stakeholders that they are properly responding to cybersecurity threats, many organizations rely on audits that [Read more...]