You are viewing 19 of 25 results
research

Cyber Insurance: Is it worth the risk?

The cyber insurance market has sustainably grown in its relatively short history, but also displayed a volatility.

Read more
research

Securing your Supply Chain: Risk-based supplier assurance when it’s needed most

The challenge for businesses is that, even with a recognition that supplier management is important to efficient ongoing operations, in too many cases it still lets cyber vulnerabilities in ‘by the back door’.

Read more
research

Securing the Supply Chain: Preventing your suppliers’ vulnerabilities from becoming your own

Sharing information with suppliers is essential for the supply chain to function. However information compromised…

Read more
research

Engaging with The Board: Balancing cyber risk and reward

When boards and CISOs engage successfully, organisations are better able to take advantage of the…

Read more
research

Establishing A Business-Focused Security Assurance Programme: Confidence In Controls

How secure is your organisation’s information? At any given moment, can a security leader look an executive in the eye and tell them how well business processes, projects and supporting assets are protected?

Read more
research

Data Leakage Prevention (DLP)

The increasing adoption of collaboration platforms, cloud services and social media, which are often accessed using personal devices, has introduced a host of new ways for sensitive data to leak.

Read more