As members of a corporate crisis management unit, steering the investigation, preparing a defense plan, and acting as the point of contact for the police… our teams played a key part in a broad range of crisis management activities.
Cloud-based services, digital transformation and open systems are placing ever greater demands on cybersecurity professionals. As a result, we need to evolve beyond traditional models (Castle/Fortress and Airport) towards a next generation cybersecurity model referred to as the “Airline” model.
The digital age goes hand-in-hand with an increasing number of crimes and attacks against banks and companies handling banking data. Discover the three main threads in the fight against fraud.
At the end of June 2016, while SWIFT was disclosing substantial losses due to cyber-attacks, the authorities of Hong Kong were announcing new regulations for the financial institutions.
Successfully addressing IAM can bring many benefits but its implementation often faces many challenges. Could Identity and Access Governance (IAG) provide the answer and assure the success of IAM projects?
This RiskInsight letter aims to interpret the evolutions concerning Blockchain and their function, to explain the risks and the documented attacks to allow you to find the right balance between risk and innovation.