Insight Search

Sort by:
  • Blogs

    August 14, 2024
    CFOs should school CISOs on materiality evaluations and reporting to the board, while CISOs can help finance chiefs better understand recovery costs, remediation efforts, single versus aggregate breaches and the nature of compromised data. Partnering closely with their CISO is one of several actions CFOs should consider to strengthen their cybersecurity disclosures, preparedness and incident…
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
  • In Focus

    October 17, 2024
    As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Programme. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB).
  • Podcast Transcript

    August 26, 2021
    Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry.
  • Flash Report

    February 28, 2024
    On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity Framework (CSF). This latest edition of the CSF is designed for all audiences, industry sectors and organization types, regardless of their degree of cybersecurity sophistication.
  • Podcast Transcript

    October 8, 2020
    Welcome you to a new edition of Powerful Insights and our continuing series on cybersecurity awareness. This series is intended to highlight ways organisations can be proactive in addressing these critical security challenges. We explore how leaders can dynamically build cyber resilience while maximising value. In this series, we will be talking to our cybersecurity leaders who are in…
  • Newsletter

    February 12, 2021
    Concern about the impact of government policies and regulations in response to COVID-19 is the No. 1 risk identified by directors and business executives across many industries. This insight is from our most recent top risk survey. Another survey we conducted last year, focused on technology risks, shows a deepening concern over cybersecurity and privacy issues, as well as regulatory compliance…
  • Blogs

    February 29, 2024
    Companies in the energy and utilities (E&U) industry are moving fast to adopt artificial intelligence (AI), including generative AI, to increase their competitive edge. But while AI can help these firms to drive innovation, boost profitability and reduce certain risks, it also increases their exposure to cyber threats.
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
Loading...