Published 03 Dec 2015
How much can companies rely on their people to not be a source of vulnerability in the face of increasing attacks on corporate information? Consider the recent “social experiment” conducted by US-based computer trade association CompTIA , involving apparently discarded US...
Behaviour|Best Practice|Business Solutions|Cyber Resilience|Cyber-Attack|Processes|Risk Management|Vulnerability
Published 12 Oct 2016
Studying the risk management dimension of the RESILIA Foundation course will enable people to better understand what is a threat, a vulnerability and an asset in the context of cyber resilience and how they combine to create a risk to the business. One way to understand the...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Published 13 Jul 2016
My good friend, Hannah Simmons, used to be CFO at a large multinational food company. If you’ve read Whaling for Beginners , you’ll know how my simple (careless) mistake sparked a chain of events that led to her getting pushed out of the company. I downloaded an innocent ...
Published 23 Dec 2015
A recent poll of City of London bosses by the Financial Times called on companies to hire a “younger generation of boardroom directors to head off the systemic threat that cyber risk poses to the financial system”.¹ I welcome business leaders openly discussing the signi...
Cyber Resilience|Cyber-attack|Information systems|Processes|Risk management|Skills|Vulnerability
Published 02 Mar 2016
When thinking about cyber resilience, just how important do you believe the people in your organization are? All your people, from top to bottom? You have heard the expression, ‘ People, Process, and Technology’ a thousand times. But which is the most critical of the three...
Cyber resilience|Cyber-attack|Information management|Processes|RESILIA|Risk management|Vulnerability
Published 03 May 2016
The success of cyber security awareness learning in organizations today is, typically judged by the ‘ticking of a box’ to say it’s been done. But have organizations – and their managers responsible for information security awareness learning – really stopped to ask whether t...
Published 21 Mar 2017
AXELOS Community hosted Whaling Week, a look into the results of a successful Whaling attack in your organization. We now present four of the best replies from throughout the week. We appreciate all the responses we received throughout Whaling Week, we had a great time readi...
Behaviour|Cyber resilience|Cyber-attack|Data protection|Threats|Vulnerability
Published 26 Mar 2015
In the world of cyber resilience, barely a week goes by without another company falling victim to cyber-attack – and to the penalties that can arise as a result. In February 2015, the UK Information Commissioner’s Office (ICO) fined insurance broker, Staysure, £175,000 after...
Behaviour|Best Practice|Cyber Resilience|Identity|Threats|Training|Vulnerability
Published 22 Oct 2015
If you think companies are out of the “cyber woods” in terms of risk, then you should think again. The latest research from insurance organization, Aon Risk Solutions , finds 90% of senior executives saying cyber risk is “not fully understood”, while 80% say companies are ...
Cyber-attack|Processes|Risk management|Senior team|Vulnerability
Published 02 Dec 2015
You only have to be a casual follower of the news to see that cyber attacks and the resulting damaging data breaches are happening with greater frequency. TalkTalk and JP Morgan are just two of the latest high profile companies to show their vulnerability to cyber crime....
Best Practice|Cyber Resilience|Cyber-attack|ITIL|Processes|RESILIA|Risk management|Vulnerability