Jul 05, 2023 Value generation in cyber: Growth, margins, and moving targets By Rahul Gujral Shagun Jain As much of the tech industry resets after years of hypergrowth, investors are searching for areas of continued growth and future...
Jun 29, 2023 Navigating the dynamic financial services cybersecurity regulatory landscape By Lukas Weber James Habben The U.S. financial services regulatory landscape is in a state of constant flux. Organizations face a myriad of proposed changes over the...
Jun 14, 2023 How can comprehensive Digital ID Management enhance cybersecurity for insurance companies and banks? By Gerrit Buschhorn Jochen Gottschalk Uwe Kissmann Insurers and banks have a high risk of becoming victims of cyber criminality when it comes to Digital ID Management Insurers and banks...
Apr 18, 2023 Why honest, open communication can counter the reputational risks of cyber attacks By Brian Kalms Edd Hardy Modern retailers are data driven, and valuable PII and payment data makes any organisation selling online an attractive and obvious...
Mar 08, 2023 Seven levers to optimize cybersecurity cost and balance security needs By Megha Kalsi Lukas Weber There are many security leaders across the globe that experience the hardship of budget reduction every year or during uncertain times...
Feb 27, 2023 What is Digital Resilience? By Derek Taylor Uwe Kissmann To paraphrase Frederick the Great, who died in 1786, 'He who defends everything, defends nothing'. Let’s discuss a single word:...
Feb 10, 2023 The war for talent – Part 2 of 5: How to overcome the digital mismatch By Piero Masera Marcello Bellitto Filippo Guidotti Mori One of the most critical issues in today’s labor market is the lack of alignment between supply and demand, calibrated on the new digital...
Feb 10, 2023 La guerra dei talenti – Ep. 2: Come superare il digital mismatch By Piero Masera Marcello Bellitto Filippo Guidotti Mori Una delle principali criticità nell’odierno mercato del lavoro è la mancanza di allineamento tra domanda e offerta calibrata sulle nuove...
Jan 25, 2023 Insider threats: Practical steps to prevent a costly breach By James Habben The term “insider threat” is commonly used within the cyber security and information security industries, referring to a risk posed by...
Jan 10, 2023 Cybersecurity Trends for 2023: How to protect your organization from attackers in a recessive economy By Megha Kalsi Nate Morin David Stanton Doing more with less: It's the new shift for cybersecurity. Driven by a looming recession and increased management scrutiny around...
Jan 03, 2023 Three winning strategies to combat the ever-increasing sophistication of cybercriminals By Lukas Weber Tim Roberts In the age of rapid technological evolution, cybercriminals have been one of the many benefactors of novel technology, capitalising on...
Nov 14, 2022 Digital Trust in Manufacturing – here comes the Chief Product Security Officer By Ismail Mohammed Business leaders often view cybersecurity as a specialized IT role when in reality, it is a subset of enterprise and business risk...
Nov 07, 2022 Mehr als nur Technik: Was Organisationen tun können, um ihre Verwundbarkeit für Cyber-Angriffe zu reduzieren By Daniel Weyh Wie so oft im Leben ist es bei Cyber-Security so, dass Vorbereitung essenziell ist, um einerseits Eintrittswahrscheinlichkeit und...
Oct 20, 2022 Industry 4.0: Seek the reward, mind the risks By Sudeep Saxena Allen Merriman Les Viszlai Thilo Wallenstein Pablo Wangermann Antonio Perez Senande Gary Tong +4 more... Show less Industry 4.0 offers great promise, but with this promise comes risk. A host of cybersecurity vulnerabilities require careful attention....
Sep 20, 2022 How to count the cost of cyber risk to drive competitive advantage By Roger Auinger Cyber risk are trigger words for individuals and corporations alike – from a mental check-up on personal password quality to anxiety over...
Sep 08, 2022 Outmaneuvering cyber threats | Private Equity International - Disruption Matters Podcast By Beth Musumeci