Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast January 10, 2024 Podcast | What Boards Need to Consider about Quantum Computing and Cryptography in 2024 - with Quantum Computing Inc. 2024 will be a milestone year for post-quantum cryptography, with NIST getting ready to release its new standards. We can expect proof-of-concept business use cases for quantum computing to become more common as machine fidelity and performance continue to improve. What should boards consider regarding PQC and other aspects of the quantum industry this year? Join Host Konstantinos Karagiannis for… Newsletter December 15, 2022 Sustainability and the Board’s Governance Role Global research indicates that companies in North America are less committed to environmental, social and governance (ESG) engagement than those in Europe and Asia-Pacific. What steps should boards seeking to improve their ESG engagement take? Survey December 20, 2023 2024 Top Risks in the Manufacturing and Distribution Industry The economy, talent and cyber threats drive concerns for manufacturing and distribution leaders beyond supply chainIn an ever-evolving and rapidly changing business landscape for manufacturing and distribution organisations, executives and boards are challenged to navigate myriad risks, particularly as their businesses continue to play catch-up on numerous fronts in areas such as innovation and… Newsletter September 28, 2022 Identifying and managing the critical risks of third-party providers “Outsourcing and other third-party relationships can bring multiple benefits to FIs, including: enhanced operational resilience; faster and more tailored financial products and services; cost reduction; greater innovation; and improved internal processes. However, outsourcing and third-party relationships can give rise to new or different risks to FIs and potentially to financial stability that… Podcast July 23, 2024 Risky Women Podcast | Women in Risk Management: Challenges and Opportunities Dive into the world of women in risk management. In this Risky Women podcast, Jenny Wong & Gayle Lacey discuss risk management challenges & opportunities. Newsletter September 10, 2021 Ransomware: Analysing Risk and Protecting Critical Assets Ransomware is a current threat many people are struggling to understand and manage. Amid the headlines and uncertainty, how can the board respond strategically? Reputation damage, hefty ransoms and business continuity are all concerns with ransomware. But the core of the conversation is about the potential loss of intellectual property and customer information and the specter of unpleasant… Client Story November 5, 2024 Navigating Security and GRC Optimisation during an SAP S/4HANA Conversion Master navigating security and GRC optimisation during an SAP S/4HANA conversion for enhanced system reliability and advanced data insights. Podcast Transcript February 8, 2023 Transcript | The Real Date of the Quantum Computing Apocalypse and What the White House Says We’ll Do About It Will quantum computers be able to crack RSA this decade? Maybe. But figuring out that exact date is not what you and your organisation should be worried about. A memorandum issued by the White House reveals when the quantum computing apocalypse will begin as far as information security boots on the ground are concerned. Join Host Konstantinos Karagiannis for a deep dive into the NSM-10 memo and… Whitepaper October 5, 2020 Private Equity and Hedge Funds: Methods of Choice for Money Laundering Threat Actors Private investment funds under management have grown over the past 25 years into a several trillion-dollar industry in the United States. In a leaked Federal Bureau of Investigation (FBI) unclassified but sensitive bulletin, the FBI concludes, with high confidence,[1] that threat actors (both financially motivated criminals and foreign adversaries) are using the private placement of funds,… Whitepaper March 22, 2019 Data, Application & Infrastructure Security Risk Assessment Let’s explore the Iceberg! Understanding gaps in how your applications and infrastructure protect your data is a priority for both Operations and Executives. Application interface is only the tip of the Iceberg Application are interfaces used to access and process data (business or personal) and are only the visible part of a more complex IT landscape. Load More