Risk Management & Reporting

Cyber Security in Financial Services

Cyber criminals are making the most of the spread of the Coronavirus.  The financial services industry is being hit particularly hard, with attackers creating their own pandemic of phishing emails trying to steal money, personal information and intellectual property.   

Read More

Data Discovery: It worked for Data Privacy Officers

Security teams face a number of challenges.  The growing extent and complexity of the technology environment that businesses utilise, the limitations of human capabilities to choose good passwords or avoid clicking on links, the increasing sophistication of attacks and attackers and the burgeoning regulations under which they operate.

Read More

Understanding cyber security maturity models

The Cybersecurity Maturity Model Certification (CMMC) is a US initiative lead by the Office of the Assistant Secretary of Defense for Acquisition within the Department of Defense (DoD). It imposes requirements on DOD contractors and subcontractors to help safeguard information within the US Defense supply chain. This post is the second in a series where we analyse the CMMC and look at how you might achieve compliance or use it as a basis of your own information security programme.  You can read the first post that gives an overview of CMMC, here.

Read More

2020: A year for regulatory compliance?

Cyber security and regulatory compliance are frequent bedfellows.  If compliance standards aren’t specifically driving security adoption, they are affecting wider areas, such as GDPR and privacy, which significantly impacts on security.

Read More

Cyber security audit challenges in 2020

The importance of accurately identifying and communicating a business’s risk exposure has never been more critical.  This is particularly true for  audit and security managers who undertake cyber security audits.   

Read More

What is an Integrated Risk Management solution?

Security risks are prevalent in most organisations, yet the consistent management of all technical, process and personnel-related security problems can be difficult as multiple teams are often identifying and mitigating them. In a bid to address this, many organisations are now fusing their risks management technologies and approaches into one Integrated Risk Management (IRM) solution comprising the platforms and processes needed to unify this critical business function.

Read More

Cyber security compliance without tears

An increasing number of regulations and standards across many different industries are stipulating the cyber security controls that should be implemented by businesses and governments to protect their information. A recent collaboration between the Monetary Authority of Singapore (MAS) and the Bank of England (BofE) has seen them develop best practices for supervising cyber risk in banks and financial organisations. Standards are a great way to consistently explain the security target organisations should strive for, where they have a requirement to protect sensitive information like credit card numbers and personally identifying information.  However, the issues relating to achieving cyber security compliance almost put the targets out of reach.

Read More
1 2 3 4