Category Archives: Risk Management

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies
Posted by

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies

Recently, I did an interview with Bloomberg Newsweek on the WannaCry ransomware attack that affected over 200,000 computers around the world.  The attack shutdown parts of the U.K. National Health Service leaving thousands of people without access to healthcare services, and resulted in Renault’s assembly lines being shut down in France among other things.  Newsweek […]

Mitigating Cyberattacks: The Prevention and Handling
Posted by

Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks New tools and technologies help companies in their drive to improve performance, cut costs and grow their businesses but as companies adopt cloud services in greater numbers and refine internal processes for development and operations, security considerations must be front and center. As companies rapidly adopt Cloud with a DevOps approach to rapid […]

Ransomware Cyber-Attacks: Best Practices and Preventive Measures
Posted by

Ransomware Cyber-Attacks: Best Practices and Preventive Measures

RANSOMWARE CYBER-ATTACKS “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, and other organizations across more than 150 countries. The ransomware encrypted user data, and demanded a payment in bitcoins to unlock the data. The companies that were hit included Telefonica – Spain’s largest telecom provider, […]

Uncover and Mitigate Third-Party Risks
Posted by

Uncover and Mitigate Third-Party Risks

Third parties have become an integral part of any business operation. However, the threats and issues arising from third-party engagements require enterprises to gain an in-depth understanding of their entire global third-party ecosystem. Failing to curb third-party risks can lead to severe reputational damage and loss of stakeholder and customer trust, but assessing third parties […]

Crowdsourcing: Enriching Corporate Data for Risk Management
Posted by

Crowdsourcing: Enriching Corporate Data for Risk Management

Crowdsourced information from internal and external sources can enrich insight generated by governance, risk and compliance (GRC) teams to help companies mitigate risk and perform better in challenging environments. The public and collaborative nature of unstructured shared data sources (such as social media) can bring issues of interest to light faster than they may show […]

Principles of an Effective Cybersecurity Strategy
Posted by

Principles of an Effective Cybersecurity Strategy

Managing Cybersecurity Risks A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a rapid increase in the number of internet connected devices, an increased dependency on third party applications, self-provisioning as a result of bring-your-own-device and public cloud. Add to these, unprecedented levels […]

Components Of An Effective Third-Party Due Diligence Program
Posted by

Components Of An Effective Third-Party Due Diligence Program

Third-party intermediates such as distributors, resellers, agents, service providers, or business consultants are contracted to rapidly create a presence in or access to new or emerging markets. They can work as the first foothold in opening a commercial presence, both domestic and internationally. Also, they can provide insights of the local business environment and their […]

What Is Important? Cyber and Continuity Risk
Posted by

What Is Important? Cyber and Continuity Risk

New risks are emerging every day in the realm of Cybersecurity, and many organizations are moving quickly to address these risks: developing documentation, procedures, and processes. However, this is often without regard for Cybersecurity best practices. To ensure sustainability, organizations must develop cyber policies, plans, and procedures and put effective controls in place. If these […]