Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs August 14, 2024 Year one insights: SEC cybersecurity incident management disclosure rules CFOs should school CISOs on materiality evaluations and reporting to the board, while CISOs can help finance chiefs better understand recovery costs, remediation efforts, single versus aggregate breaches and the nature of compromised data. Partnering closely with their CISO is one of several actions CFOs should consider to strengthen their cybersecurity disclosures, preparedness and incident… Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. In Focus October 17, 2024 The DoD unveils the Cybersecurity Maturity Model Certification Programme: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Programme. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB). Podcast Transcript August 26, 2021 TRANSCRIPT | PRIVACY & CONSENT WITH KATIE STEVENS Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Flash Report February 28, 2024 NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity Framework (CSF). This latest edition of the CSF is designed for all audiences, industry sectors and organization types, regardless of their degree of cybersecurity sophistication. Podcast Transcript October 8, 2020 Transcript- Cybersecurity Hits Close to Home Welcome you to a new edition of Powerful Insights and our continuing series on cybersecurity awareness. This series is intended to highlight ways organisations can be proactive in addressing these critical security challenges. We explore how leaders can dynamically build cyber resilience while maximising value. In this series, we will be talking to our cybersecurity leaders who are in… Newsletter February 12, 2021 Priorities and Risks – For Private Equity, Lingering Effects of COVID-19 Create a Mix of Opportunities and Risks Concern about the impact of government policies and regulations in response to COVID-19 is the No. 1 risk identified by directors and business executives across many industries. This insight is from our most recent top risk survey. Another survey we conducted last year, focused on technology risks, shows a deepening concern over cybersecurity and privacy issues, as well as regulatory compliance… Blogs February 29, 2024 AI usage in energy and utilities sector: Challenges and opportunities Companies in the energy and utilities (E&U) industry are moving fast to adopt artificial intelligence (AI), including generative AI, to increase their competitive edge. But while AI can help these firms to drive innovation, boost profitability and reduce certain risks, it also increases their exposure to cyber threats. Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Load More