cyber (95)

 

4 Steps to Jumpstart Compliance with CMMC

Is your business in the supply chain for the Department of Defense? Or another government entity?

Last year the Department of Defense (DoD) rolled out the Cybersecurity Maturity Model Certification (CMMC). The DoD will require CMMC certification from supply chain companies that make up the defense industrial base.

As legal and compliance professionals, you will be responsible for understanding and enforcing the new DoD security regulat

Read more…

As we look forward to spring, and hopefully a route out of the pandemic, you can rely on Intelligent Insurer to deliver high value, concise webinars with insights from top-level executives of well-known insurers.
 
Take one hour out of your schedule to reinvigorate your strategy and benchmark yourself against industry leaders—check out the list of webinars below.
 
To complement our longstanding Underwriting and Claims webinars, our Auto webinar series and Cyber webinar series have been added to

Read more…

Save your seat to learn valuable insights to reduce your supply chain risks in 2021

 
Logo
 
 
 
 
 

Live Webinar

Risk Management Lessons from the SolarWinds Hack
Wednesday, January 27 | 60 minutes | 10 AM PT, 1 PM ET

Last month there was a Russia-linked cyber-attack on SolarWinds, a network management software vendor. This attack brings your regulatory and privacy compliance efforts under scrutiny as i

Read more…

This is a transcription of our interview with Liam Healy, SVP and Managing Director at Diligent about ESG, Legal Operations and CyberSecurity. 

You can watch the original video interview here or an audio podcast here. You are also welcome to subscribe to our podcast in all major podcast apps by searching "Risk Management Show".

8272620482?profile=original 

Boris: Welcome to our interview with Liam Healy. Liam is a SVP and Managing Director at Diligent, which is a market leading provider of the comprehensive Governance sof

Read more…

8028322493?profile=original

FranSec Virtual IT Security Conference launches on 24th – 25th June, uniting cyber security leaders from across the country to exchange in-depth knowledge and expertise towards safeguarding the nation’s Banking & Finance, Energy, FMCG, Agriculture, Manufacturing, Chemical & Pharmaceuticals, Automotive industries.

 

2019 was a record-breaking year for cyber-attacks in France. A staggering 67% of companies fell victim to malicious activity and with only 10% equipped to cope with them. As digitalisat

Read more…

By Sophie Bottazzi, Senior Research Executive, CeFPro

The payment industry in Europe continues to evolve with the huge influx of new payments providers in the market, increased regulatory demand and evolving customer expectations of products and services. With the implementation of PSD2/Open Banking becoming more embedded, the payments landscape continues to evolve as APIs open up customer data for more institutions to leverage. With such increased demand and competition comes heightened regulato

Read more…

You might be surprised to know that more than 3.4 billion fake emails are sent around the globe each day. What does this mean? It means that almost every company out there is vulnerable to cybercrimes in the form of “spoofing” and “phishing.” On top of this, most companies out there have not protected themselves from this type of cyber attack. What’s even more interesting is that the vast majority of these emails are not coming from some foreign land, but they are coming from sources based in th

Read more…

Connected Insurance USA Summit (Nov 20-21, Chicago) is bringing together over 700+ senior insurance leaders to redefine the future of insurance.

 

With over 350 executives already registered to attend, this will be the largest executive gathering for forward-thinking carriers. CEOs, COOs, CMOs, SVP and VPs from Product, Customer, Claims, Technology and Innovation know that this is the time to act and leverage innovative technology to boost efficiency and customer experience or risk survival. This

Read more…
8028299277?profile=originalThe Internal Institute of Auditors (IIA) and ISACA held their 2019 Governance, Risk, and Control Conference from August 12th to 14th in Fort Lauderdale. This year I was honored to be selected to speak on the effects of data privacy risks in the See-Through Economy in my presentation, “Prepare for a Data Governance Revolution with a Risk-Based Approach.”

Each year, powerhouse risk governance associations ISACA and the IIA bring together the leaders of  the governance, risk, and control (GRC) indus

Read more…

8028300860?profile=original

The automotive cybersecurity market segmentation (on the basis of product type) is further categorized into intrusion detection system (IDS) and intrusion detection and prevention system (IDPS). The IDPS dominated the global automotive cybersecurity market in 2018 and is anticipated to maintain its dominance throughout the forecast period (2019-2029).

Browse the Full TOC "Automotive Cybersecurity Industry"

https://bisresearch.com/industry-report/automotive-cybersecurity-market.html

The automotive c

Read more…

8028299497?profile=original

CHICAGO: Insurance Nexus webinar to explore how insurance carriers can collaborate with brokers and clients to build customer-centric cyber insurance policies, July 30th, 11am ET

Cyber-crime is not new, but as the methods of nefarious actors have become more sophisticated, the defensive capabilities of organizations have failed to keep pace. Cyber-attacks on organizations show no signs of abating, they are becoming increasingly indiscriminate in their targeting, with small and medium sized firms

Read more…

8028291296?profile=original

The recent and rapid growth in cyber-crime is proving something of a double-edged sword for insurance carriers; opportunities for coverage are expanding rapidly, with PWC predicting the cyber market to grow to $7.5 billion by the end of the decade, up from $2.5 billion in 2018. With the sector in its formative years and not all consumers convinced of the need for cyber coverage, most carriers are competing by offering expanding cyber coverage without charging additional premiums, at significant

Read more…

Can you believe what you see in a video? Most people say ‘yes,’ but the truth is, you no longer can. We all know that photos can be altered, but videos? Thanks to artificial intelligence, these, too, are being altered at a very quick rate.

These videos, known as “deepfakes,” are out there, and they are doing a number on cybersecurity. In fact, leaders in the cybersecurity sector are warning consumers that high tech video alteration is here, and it is very difficult to tell with the naked eye whet

Read more…

8028293665?profile=original

ISACA, a leading nonprofit organization dedicated to the development, adoption, and use of industry-leading information security knowledge and best practices, opened up its 50th anniversary celebration this year with their 2019 North America CACS Conference. I was fortunate enough to be invited to speak to the more than 1,500 cybersecurity professionals in attendance about how to operationalize their cybersecurity programs and turn policy into action.

The North America CACS Conference is the prem

Read more…

When you think of a cybercriminal, you probably picture someone in a black hoodie in a dark room on the dark web, but most cybercriminals are out there in plain sight, including on Facebook.

Talos, a cybersecurity firm, found that people can easily join Facebook groups, and then participate in cybercrime including buying and selling credit card info, obtaining spamming tools, or even getting account logins and passwords. All in all, these groups have almost 400,000 members.

Though that does sound

Read more…

Security is the concern that comes across the management of every company and every year companies pay huge amount on their cyber security. As year time is passing by, technologies are getting bigger and better and so the threat to them. Since it’s the world of online technology and where everything is computerized or automated, there cyber security threats are also getting bigger and serious every day. So, the people are specializing is protecting their systems and organizations cyber risk or t

Read more…
Cybersecurity vulnerabilities are an increasing concern for every company in every industry. Year over year, data breaches increase by 75%. Why are they becoming more prevalent, and how can you protect your business?

8028282501?profile=originalBefore you can protect your company from a data breach, you have to understand why they’re occurring. So let’s look at some statistics:

  • 81% of hacking-related breaches leveraged either stolen and/or weak passwords
  • 70% of employees reuse passwords at work
  • Ransomware is the top variety of
Read more…

Background Checks Don't Tell the Whole Story

When it comes to background checks, the National Crime Information Center is the gold standard. It is only available to law enforcement agencies and is the most accurate and complete database tracking convictions and arrests in the US. That sounds pretty great, right? Unfortunately, it’s not all as it seems.

The Department of Justice

The Department of Justice recently released a report based on a two-year study of convictions and arrests from 2016. The report shows that a very low percentage of co

Read more…

Cyber criminals are constantly trying to stay one step ahead of the good guys, and there is now another scam out there that you should know about: synthetic identity theft. Basically, the criminals take information from someone, and then make up the rest. They also often use fake Social Security numbers, called CPNs, or “credit profile numbers,” or names.

This type of identity theft shows us that our credit system is more vulnerable than we might think. Basically, it is easy to create a credit fi

Read more…

Criminals have a reliance on tricking victims to get access to account information, like passwords. This is known as social engineering, and is also called a “confidence crime.” These come in many forms:

Do Not Take the Bait of These Phishermen

  • A phishing email that targets a specific person is known as spear-phishing. A spear-phishing email looks like an email that might come from a legitimate company to a specific person. For example, a thief might send a fake email to a company’s employee who h
Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead