Published 24 Mar 2016
This is the first in a series of conversations with Nick Wilding and leading cyber resilience commentators and practitioners from around the world. Who should countries and companies learn from when thinking about cyber resilience? Estonia has been described in tech pub...
Published 14 Mar 2016
Janek Rozov, Head of the Information Society Services Development Department at the Ministry of Economic Affairs and Communications in Estonia, explains how it has introduced a multiple-view service catalogue to improve understanding of services amongst its citizens and allo...
Best Practice|Frameworks|IT Service Management (ITSM)|IT services|ITIL|Processes|Service catalogue
Published 20 Oct 2017
Organizations can use the introduction of GDPR in May 2018 to learn more about their customers while building customer loyalty and increasing efficiency. According to John McDermott, EMEA Portfolio Manager at Hewlett Packard Enterprise (HPE), the new regulations are a busine...
Behaviour|Customer engagement|Cyber resilience|Data protection|RESILIA|Training
Published 20 Nov 2018
As part of the CBI Cyber Security Conference 2018 , experts hosted a future looking session to “examine the latest threat intelligence and emerging risks for businesses in the cyber security landscape”. The panel considered what threat and risk issues boards need to be addr...
Best practice|Cyber resilience|Cyber security|Cyber-attack|GDPR|Threats
Published 24 Aug 2016
The risk of being held to ransom is no longer just a phenomenon of the physical world - the digital world is subject to the menace of Ransomware . Ransomware is where an attacker renders your computer system and your data unavailable to you through encrypting your data and ...
Published 14 May 2018
Personal information is an asset that can create more value for customers, hence people want to share their data with organizations. However, the EU General Data Protection Regulation (GDPR) says we have to manage their data properly. From 25 May 2018, this applies insi...
Best practice|Cyber Resilience|Cyber-Attack|GDPR|Incident management|ITIL|Value