Cybersecurity
Collection

Cyber resilience is an organisation’s ability to detect, prevent, respond, recover and learn from cybersecurity disruptions. Our cybersecurity collection explores common issues, trends and what organisations must do to prepare proactive and reactive solutions to and keep your assets safe.

Featured Insights

New White House Cybersecurity Strategy Creates Additional Concerns for Businesses
The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well...

The Innovation vs. Technical Debt Tug of War
Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for...

Podcast | IT Audit Perspectives on Today’s Top Technology Risks
The greatest IT audit concerns lie with cybersecurity-related breaches and related risk issues. Data governance and data integrity are being...

IT Audit Perspectives on Top Technology Risks
Results of ISACA/Protiviti global survey reveal cybersecurity, privacy, data and regulatory compliance are top-of-mind concerns
An uncertain global...
Managed Security Services

ISO 27001: 2022 - Key Changes and Approaches to Transition
This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organisations can take to...

Protecting the Enterprise: How a Well-Designed Security Analytics Programme Can Help
The purpose of security analytics in an organisation
Security metrics and the analysis of security information can be challenging concepts even for...

How can an enterprise use access management to establish a Zero Trust environment?
A hybrid RBAC, ABAC and PBAC framework is the best practice approach
A strong access management programme is foundational to establishing a Zero...

Ransomware: Analysing Risk and Protecting Critical Assets
Ransomware is a current threat many people are struggling to understand and manage. Amid the headlines and uncertainty, how can the board respond...
Data Protection

PCI Security Standards Council Publishes New Versions of Self-Assessment Questionnaires
On April 29, 2022, the PCI Security Standards Council (PCI SSC) released new versions of the PCI DSS Self-Assessment Questionnaires (SAQs) ahead of...

PCI Security Standards Council publishes updated data security standard
DSS 4.0 addresses rapidly evolving threat environment and provides flexibility for how organisations can achieve compliance
On March 31, 2022, the...

Ensuring Technology Fluency in the Boardroom
Every company is a technology company today. With business and technology inextricably intertwined, directors need to possess sufficient knowledge of...

Framing the Data Privacy Discussion in the Boardroom
Data proliferation and data privacy regulatory activity across the globe have created the need for focused boardroom discussions.
While...
Security Resilience

Guide to business continuity & resilience
Plan for the Unexpected. Build Resiliency.
Instill your organisation with the advantage to endure company disruptions and consistently meet...

SIFMA Quantum Dawn VI
A Decade of Testing and Resilience
Over the past 10 years, the Securities Industry and Financial Markets Association (SIFMA) has coordinated a...

Building Resilience in the Cloud
In 2019, AFME published its first paper on the adoption of public cloud in capital markets[1]. Since then, the adoption of cloud has continued to...

U.K. Supervisory Authorities and Basel Committee Refine Operational Resilience Approaches, Align on Expectations for Firms
Several Key Policies Take Effect March 31, 2022
On March 29, 2021, the Bank of England (BoE), the Prudential Regulation Authority (PRA) and the...
Security Architecture

Artificial Intelligence: Can Humans Drive Ethical AI?
Artificial intelligence (AI) is a powerful technology that’s driving innovation, boosting performance, and improving decision-making and risk...

Framing the Data Privacy Discussion in the Boardroom
Data proliferation and data privacy regulatory activity across the globe have created the need for focused boardroom discussions.
While...

Strong, flexible identity and access management, built collaboratively
Solving complex identity and access management issues for an organisation often requires finesse, collaboration and the ability to creatively meet the...

Towards an Identity-Centric Security Strategy
Cyber attacks are rampant
Let’s face it, cyber security professionals are not faring well against the increasing sophistication of attacks by...