Pasar al contenido principal

Julio

Why threat actors love your summer holiday plans

Why threat actors love your summer holiday plans

Whether you're heading off on a city break or getting ready to hit the beach, threat actors are waiting for your cyber defences to relax over the holidays too. Kevin Groves sets out what organisations can do to ensure that threat actors don't get to take advantage of a well-earned rest. 

Litigation readiness: the key to navigating the aftermath of a cyber incident 

Litigation readiness: the key to navigating the aftermath of a cyber incident

Legal action tends to follow in the wake of a cyber incident, but preparing for lawsuits is an aspect of cyber defence that many organisations neglect. Martin Nikel, Director of eDiscovery and Litigation Support, always highlights the importance of timely data preservation to clients. In this week's Cyber Series, Martin explains why it's essential to preserve data, including communications before, during, and post-breach, as soon as litigation becomes a possibility.  

Incident response plans: The journey is as important as the destination 

Incident response plans: The journey is as important as the destination

In an era where cyber threats are ubiquitous and increasingly sophisticated, having a robust cyber incident response plan (CIRP) is indispensable for any organisation. However, the process of developing this plan is as critical as the finished document itself.   

Join our guides Alistair Purdy and James Thoburn as they explain how this journey to creating a CIRP, whether on your own or with expert support, fosters a deeper understanding of your organisation, strengthens its defences, and ensures a state of preparedness that a pre-packaged plan simply cannot provide.    

 

June Cyber Summary

June Cyber Summary

In this week's Cyber Series, threat intelligence lead Stephen Green summarises just what happened when the Qilin group's attack on an NHS provider caused massive disruptions across hospitals in London; reveals the infiltration of Scattered Spider's web by law enforcement, and explains why the LockBit gang got caught out by greatly exaggerating (or lying) about its exploits. 

 

Junio

The cyber security retainer explainer 

The cyber security retainer explainer 

A cyber security retainer is – or should be – an essential part of overall risk management. But what is a cyber security retainer, exactly? Why does it matter so much? And how do you know you're getting value for money?  

From the cost efficiencies to the peace of mind that comes from knowing that experts have your back, Kevin Groves and Edward Starkie explain the ins and outs of cyber retainers and why you don't want to start thinking about them only after an incident is underway. 

 

Cybersecurity regulation: What should we expect?

Cybersecurity regulation: What should we expect?

From AI-washing to operational resilience, regulators have a lot to think about when it comes to cybersecurity -- which means the organisations they regulate have a lot to think about too. Ed Starkie looks at what can be expected from cybersecurity regulation over the next few years, based on the current direction of travel and recent case law.

Personal liability and the CISO: The consequences of accountability

Personal liability and the CISO: The consequences of accountability

When most of us discuss cybersecurity threats, we tend to focus on the threat actor and their actions. But in the wake of many recent major cyber incidents, the actions taken (or not taken) by CISOs are under just as much scrutiny as those of the threat actors. CISOs are increasingly being held personally responsible for cybersecurity failings.


Edward Starkie explains why this is, and why holding CISOs accountable for cybersecurity weaknesses could benefit CISOs in the long run.

Mythbusting: Realising value from cybersecurity in M&A due diligence

Mythbusting: Realising value from cybersecurity in M&A due diligence

Despite the increasing emphasis on cybersecurity and the part it plays in the economy, there are still some widely held misconceptions about its role in the M&A process. This knowledge gap creates common pitfalls and missed opportunities for investors. Ed Starkie busts some common myths about cybersecurity and M&A due diligence in this week’s edition of Cyber Series. 

Mayo

May in review: UniSuper weathers storm after Google Cloud glitch

May in review: UniSuper weathers storm after Google Cloud glitch

May was another eventful month in cyberspace:

  • The US SEC has announced a regulatory update that will put pressure on financial institutions to better protect client data
  • Australian pension fund UniSuper lost its data – twice! – thanks to a “glitch” with Google Cloud
  • Law enforcement scored a rare win against a dark web marketplace (at least for now).

Join threat intelligence lead Stephen Green for a review of the month that was and a look at the trending digital threats facing the financial sector.

Review and strengthen: How to get value from a penetration test

Review and strengthen: How to get value from a penetration test

So you have your pen test results – now what? In part 2 of our look at how to get the most out of your penetration testing, Ed Starkie, Director of Governance, Risk and Compliance (Cyber) explains why the actions you take after your pen test are as important as the test itself.