All Security Threats articles – Page 4
-
EventPrivSec & GRC Connect London
PrivSec & GRC Connect London will provide a platform that allows organisations to address the cumulative nature of risk, unite disparate GRC specialties and create a compelling ‘deep dive’ agenda led by subject matter experts and thought leaders.
-
NewsThere’s nothing quite like face-to-face engagement!
#RISK London 2023 took place on the 18 & 19 October and attracted over 4,000 senior decision makers from end user organisations.
-
VideoThe Role of AI in Cybersecurity: Opportunities and Challenges
Panellists will share their insights and experiences in using AI to protect against cyber attacks, discussing topics such as the potential of AI to automate security processes, the limitations of current AI technology, and the ethical considerations surrounding the use of AI in security. The session will provide practical advice on how to leverage the power of AI to improve your organisation’s cyber defences.
-
VideoSocial Engineering: How Phishing Attacks Are Getting Better, and What to Do About It
This session will explore the various technical and organisational measures that your organisation can implement to defend against one of the most pervasive and effective security threats.
-
VideoHow to build cyber resilience in today’s threat landscape
In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience.
-
FeatureAutomate and Educate at scale: Two key focuses when it comes to Vendor Risk Management
According to KPMG, 73% of organisations have experienced at least one significant disruption from a third-party cyber incident within the last three years. And with breaches involving third parties costing businesses more than $4.29 million on average - investment in vendor risk frameworks is increasing at a rapid rate.
-
FeatureCyber Security, is it a core part of your ESG?
Let’s take a look at why cyber security is a core part of ESG.
-
FeatureElevate your cybersecurity with C2 Risk
Technology plays an integral role in both personal and professional aspects of our lives but the importance of robust cybersecurity cannot be overstated. With threats looming everyday, the C-Suite and organisations alike need to be proactive in securing their digital defences to protect themselves against potential risks posed by third-party suppliers.
-
WebinarLatest Cybercrime Trends: How Can Your Organization Protect Itself?
Webinar produced by GRC World Forums in association with SoSafe
-
NewsID theft hits USA’s southern states most through 2022
New research has revealed that citizens in the southern states of the US suffered most from ID theft in 2022 compared with the rest of the country, with millennials most likely to be the victims.
-
NewsCorporate secrets readily available on recycled company routers
New research into the fate of corporate network devices sold and bought on the secondary market represents a major cause for security concern.
-
NewsHybrid working may undermine organisational security
The impact of hybrid work on organisational security is a top concern for chief information security officers (CISOs), according to a new study.
-
NewsSurvey lists US identity theft hotspots
Rhode Island has been identified as the worst state in the U.S. for identity theft, according to a recent study.
-
TrainingISO/IEC 27001:2022 and ISO/IEC 27002:2022, and how they affect your organisation
ISO/IEC 27001:2022 is the newest iteration of the international standard that sets out the specifications for an ISMS (information security management system).
-
WebinarCybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
WebinarConducting Investigations in a Zero-Trust Environment
Every day, organisations are faced with insider and outsider threats. Because of that, the Zero-Trust security approach is quickly becoming the standard for both corporations and Government agencies.
-
WebinarThe Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarDriving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.





