Published 12 Oct 2016
Studying the risk management dimension of the RESILIA Foundation course will enable people to better understand what is a threat, a vulnerability and an asset in the context of cyber resilience and how they combine to create a risk to the business. One way to understand the...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Published 03 May 2016
The success of cyber security awareness learning in organizations today is, typically judged by the ‘ticking of a box’ to say it’s been done. But have organizations – and their managers responsible for information security awareness learning – really stopped to ask whether t...
Published 21 Mar 2017
AXELOS Community hosted Whaling Week, a look into the results of a successful Whaling attack in your organization. We now present four of the best replies from throughout the week. We appreciate all the responses we received throughout Whaling Week, we had a great time readi...
Behaviour|Cyber resilience|Cyber-attack|Data protection|Threats|Vulnerability
Published 02 Mar 2016
When thinking about cyber resilience, just how important do you believe the people in your organization are? All your people, from top to bottom? You have heard the expression, ‘ People, Process, and Technology’ a thousand times. But which is the most critical of the three...
Cyber resilience|Cyber-attack|Information management|Processes|RESILIA|Risk management|Vulnerability
Published 26 Mar 2015
In the world of cyber resilience, barely a week goes by without another company falling victim to cyber-attack – and to the penalties that can arise as a result. In February 2015, the UK Information Commissioner’s Office (ICO) fined insurance broker, Staysure, £175,000 after...
Behaviour|Best Practice|Cyber Resilience|Identity|Threats|Training|Vulnerability
Published 22 Oct 2015
If you think companies are out of the “cyber woods” in terms of risk, then you should think again. The latest research from insurance organization, Aon Risk Solutions , finds 90% of senior executives saying cyber risk is “not fully understood”, while 80% say companies are ...
Cyber-attack|Processes|Risk management|Senior team|Vulnerability
Published 02 Dec 2015
You only have to be a casual follower of the news to see that cyber attacks and the resulting damaging data breaches are happening with greater frequency. TalkTalk and JP Morgan are just two of the latest high profile companies to show their vulnerability to cyber crime....
Best Practice|Cyber Resilience|Cyber-attack|ITIL|Processes|RESILIA|Risk management|Vulnerability
Published 23 Dec 2015
A recent poll of City of London bosses by the Financial Times called on companies to hire a “younger generation of boardroom directors to head off the systemic threat that cyber risk poses to the financial system”.¹ I welcome business leaders openly discussing the signi...
Cyber Resilience|Cyber-attack|Information systems|Processes|Risk management|Skills|Vulnerability
Published 18 Jan 2016
How much do Small and Medium Sized Enterprises ( SMEs ) have to fear from cyber-attack? The high profile cyber attacks of the past year have involved much bigger commercial fish than companies in the SME market. But that doesn’t render them immune – far from it. 74% of s...
Cyber resilience|Cyber-attack|Data Protection|RESILIA|Risk management|Vulnerability
Published 30 Aug 2016
No matter how sophisticated an organization’s technical controls, there is always a risk of attack. In this day and age, with the great speed at which technology is advancing, the constant evolution of threats makes it impossible for any business to be 100% protected; what th...
Published 10 Feb 2017
Getting your awareness training right is essential for cyber resilience Cyber-related fraud is at its highest level since 2008 according to the latest research – a stark fact that makes information security awareness learning for employees more vital than ever. The recen...
Published 20 Jul 2016
Okay, I don’t usually quote Shakespeare, but there’s one line that I’ve remembered since I was at school in England. It comes from Othello : “Reputation, reputation, reputation! O, I have lost my reputation! I have lost the immortal part of myself.” All the publicity aro...
Cyber resilience|Cyber-attack|Identity|IT services|RESILIA|Vulnerability
Published 27 Jul 2016
During the run-up to the US election there’s been a lot of talk about who’s for real and who’s faking it. Who you would like to have a beer with, and who you’d trust with the economy. When I saw a headline about a ‘Fake President Scam’ the other day, I thought it was about ye...
Published 26 Jul 2017
Ever had the nightmare of your company being hacked and it making national news? Have you ever stood in front of your board and felt like saying ‘I told you so’? This is exactly what happened to one CSO (Chief Security Officer) in our real-life C yber Stories from the Frontl...
Published 24 Aug 2017
Phishing , Trojan Horses, Malware, Whaling , Denial of Service – these are all terms that have become common currency in the world of cyber security. With increasing public exposure of global organizations’ cyber security vulnerabilities , the language of cyber threats a...
Behaviour|Cyber resilience|Cyber security|Cyber-attack|RESILIA|Threats|Vulnerability
Published 17 Apr 2015
Politics often throws up examples of highly memorable, and equally emotive, language designed to make voters think a certain way about a particular party. The UK’s current election fever is no different, with politicians coining the rather loaded phrase, “Weaponizing the NHS...
Published 17 Aug 2016
Why is there an obsession with where a cyber-attack originates? In recent reports about attacks on SWIFT (the global financial messaging service) at various banks, there was speculation that it may have been the work of well-skilled and motivated groups creating malware. T...
Published 23 Apr 2015
When I read about the latest cyber attack in the press I wonder how the ordinary person in the street is responding to the same story. Do they feel interested or intrigued? Do they want to understand more? Do they feel that they have a part to play? I suspect most don’t but i...
Published 05 Oct 2016
Cyber security, today, is often very technology-based with a focus on technical issues such as firewalls and virus scanning software. While technology is an important part of the cyber defence, it is important not to neglect strategy in identifying what controls an organi...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Published 21 Oct 2016
I n recent years Romania and, more broadly, South East Europe have become a hotbed for international IT services. Due to the region’s Internet of Everything approach, the IT market is booming and facilities like Security Operations Centres (SOCs) and Network Operation Centres...
Communication|Continual Service Improvement (CSI)|IT services|ITIL|Processes|Resource management
Published 27 Jul 2018
An AXELOS webinar – Protecting the reputation of UK Further and Higher Education with your greatest defence: your people – has highlighted how Further and Higher Education establishments are the ideal target for cyber attackers. Education institutions hold personal and fin...
Behaviour|Cyber Resilience|Cyber security|Cyber-Attack|RESILIA|Sensitive data|Threats|Vulnerability
Published 18 Mar 2019
Recently I had a fascinating meeting with the chief executive of a start-up company who are about to disrupt an established market – this was always going to be an interesting discussion! They have established that there is a ‘Delta’ in the performance of existing companie...
Agile|AgileSHIFT|Business solutions|Collaboration|Customer experience|Stakeholder engagement|Value
Published 25 Jun 2019
With tech-centric changes driving disruption all around us, AgileSHIFT has a simple indicator to help you assess the impact on your organization. The Delta is the difference between the 'target state' and the current performance level. The larger the delta, the more exposed...
Agile|AgileSHIFT|Business solutions|Change management|Digital transformation|Threats|Vulnerability
Published 01 Apr 2020
Companies worldwide are now realizing that cyber resilience is not just a “good to have”, but a necessity. It’s no longer a question of if but when risks will emerge and when vulnerabilities are exploited with threats relating to information assets such as data, syst...
Published 20 Mar 2020
One group who are clearly enjoying the coronavirus pandemic are cyber criminals. It’s proved yet another valuable opportunity for them to play on our fears, doubts and vulnerabilities through simple phishing scams . Yet, like regularly washing our hands to avoid getting sick...
Cyber resilience|Cyber security|Cyber-attack|Data protection|Threats|Vulnerability