From checklist to management system: Getting value from the NIST CSF and ISO 27001:2022
This paper breaks down the NIST CSF & ISO 27001 and proposes a risk-based, management system approach to cyber security in the Digital Era.
Recently, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued an updated advisory that warns against paying out ransomware demands (...)
Security breaches through third parties have become increasingly common, as hackers seek entry points to an enterprise’s information. How can you protect yourself? This blog offers a systematic approach to vendor risk.
Cyber security has become an increasingly important issue for organizations in every sector. But one of the most attractive and [Read more...]
According to Gartner, Dynamic Risk Governance is the new mandate and organisations need to get better at managing risk holistically. Furthermore, [Read more...]
With such dramatic changes in business operations caused by the pandemic, corporations are increasingly relying on their CISOs to manage [Read more...]
Read this blog to learn why financial institutions should aim to strengthen cybersecurity by focusing on risk.
Effective risk management needs everyone to play their part - both the back office and the front office. Read this blog to find out how you can engage different stakeholders with IRM.
Following our recent blog, Our cyber risk predictions of 2020: What effect did Covid-19 have?, we now look ahead to this year, one that we hope will be less turbulent and more productive for all.
The year 2020 has been like no other, with Covid-19 having devastating, profound effects. When it comes to cybersecurity, the [Read more...]
Businesses face risks on many fronts, particularly in cybersecurity, for which Gartner predicts spending will grow by 2.4% in 2020 despite the [Read more...]
To reassure themselves and their stakeholders that they are properly responding to cybersecurity threats, many organizations rely on audits that [Read more...]
No matter how securely an organization guards itself against cybersecurity attacks, it’s vulnerable if a vendor it works with hasn’t [Read more...]