-
Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organisations have failed to make commensurate investments in data protection,…
-
A major cybersecurity event can dissolve millions of dollars in assets and tarnish even the strongest company's reputation. As cybersecurity concerns grow and evolve, companies need to be prepared for the inevitable cyber attacks with strong defenses to identify breaches and minimise damage. But how does leadership know where to invest in cybersecurity? How much is at risk? What should be…
-
What Happened to Mammoth Bank?
Mammoth Bank demonstrated how quantification can be deployed to analyse ransomware risk accurately to acquire critical insights needed to build cyber resilience. Learn more about this fictional entity’s journey below.
-
Safer supply chain, more information sharing, additional compliance
Having faced more cyberattacks than other sectors, banks and other financial services firms have been at the forefront of the fight against cybercrime in recent years. To protect themselves, banks have substantially invested in cyberattack prevention and increased their incidence-response capabilities.
-
On-Premises Exchange Servers and All Hybrid Systems Impacted
On Tuesday, March 2, 2021, Microsoft released four out-of-cycle security updates for on-premises Microsoft Exchange Servers to address vulnerabilities that have been exploited in limited and targeted attacks by a previously unknown Chinese espionage group. Upon validating the attacks, Microsoft immediately shared patches of…
-
In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology.
-
The future of organisations will be built on the ability to work securely from anywhere, using any device at any time. This was made clear during the COVID-19 pandemic, which forced millions of workers to work from home using company-owned or personal devices. As the velocity and persistence of cybersecurity attacks increase daily and digital transformation continues to be a priority for…
-
The Commonwealth of Virginia passed the Consumer Data Protection Act (CDPA) into law on March 2, 2021, following overwhelming bipartisan support for a state consumer privacy law. The November 2020 election results provided the much needed impetus to strengthen consumer privacy for the Commonwealth of Virginia. State officials wasted no time in introducing the privacy bill. Now that the…
-
July 17, 2020
On Thursday, July 16, the Court of Justice of the European Union (CJEU) implemented a landmark ruling in case C-311/18 - Data Protection Commissioner v Facebook Ireland and Maximillian Schrems (more commonly referred to as “Schrems II”). While it concluded that Standard Contractual Clauses (SCCs) issued by the European Commission…
-
Cyber risk quantification (CRQ) uses industry leading and highly vetted probabilistic models to more accurately describe the cyber security and technology-based risks facing an organisation. Tune in to Protiviti's subject matter experts answer 15 frequently asked questions about CRQ.