Monthly Archives: June 2017

Compliance Meaningfulness: Hard to Achieve, Easy to Destroy
Posted by
Posted in

Compliance Meaningfulness: Hard to Achieve, Easy to Destroy

In an article titled, What Makes Work Meaningful- Or Meaningless by Catherine Bailey and Adrian Madden (MIT Sloan Management Review, Summer 2016),  the authors focus upon what makes our work meaningful, with research conducted across multiple industries and responsibilities. While their findings are presented as relevant to the overall workforce, the compliance implications are significant and […]

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies
Posted by

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies

Recently, I did an interview with Bloomberg Newsweek on the WannaCry ransomware attack that affected over 200,000 computers around the world.  The attack shutdown parts of the U.K. National Health Service leaving thousands of people without access to healthcare services, and resulted in Renault’s assembly lines being shut down in France among other things.  Newsweek […]

Mitigating Cyberattacks: The Prevention and Handling
Posted by
Posted in

Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks New tools and technologies help companies in their drive to improve performance, cut costs and grow their businesses but as companies adopt cloud services in greater numbers and refine internal processes for development and operations, security considerations must be front and center. As companies rapidly adopt Cloud with a DevOps approach to rapid […]

Ransomware Cyber-Attacks: Best Practices and Preventive Measures
Posted by

Ransomware Cyber-Attacks: Best Practices and Preventive Measures

RANSOMWARE CYBER-ATTACKS “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, and other organizations across more than 150 countries. The ransomware encrypted user data, and demanded a payment in bitcoins to unlock the data. The companies that were hit included Telefonica – Spain’s largest telecom provider, […]

Uncover and Mitigate Third-Party Risks
Posted by

Uncover and Mitigate Third-Party Risks

Third parties have become an integral part of any business operation. However, the threats and issues arising from third-party engagements require enterprises to gain an in-depth understanding of their entire global third-party ecosystem. Failing to curb third-party risks can lead to severe reputational damage and loss of stakeholder and customer trust, but assessing third parties […]