Do You Really Have a Cyber Incident Communication Strategy?
In the face of a cyber ransomware incident, effective communication is crucial. Learn how to develop a robust strategy to protect your organisation’s reputation and financial stability.
In the face of a cyber ransomware incident, effective communication is crucial. Learn how to develop a robust strategy to protect your organisation’s reputation and financial stability.
On the 9th of March 2023, IBRS moderated an in-depth peer roundtable on the challenges and future of fraud detection. The session was conducted as part of the Australian Cyber Security Leadership Summit and sponsored by Confluent. The session was attended by senior cyber security and fraud specialists from Australia’s top enterprises and conducted under Chatham House rule. Following is a summary of the key observations discussed and recommendations shared by the participants.
ICT executives need to establish guardrails to govern and manage the use of technology for their organisation and its stakeholders. Policies are the tool that comes immediately to mind when doing so, but they are not the only way. Use this handy IBRS model to help decide if a policy is the best solution, or whether a simpler guideline, standard or procedure could be a better fit.
YubiKeys remains a highly effective and secure form of authentication and is now being used by the Austrian government. Will this influence other countries to follow suit?
As users take more control of what information they share through utilising ad blockers, disposable emails, and even limiting the data which they reveal whilst using digital services, is zero party data the best way to ensure enterprises still acquire valuable user information for marketing and other data-driven business decisions?
Zero trust is the current rallying cry for security architecture. Does that signal the death knell for firewalls?
Completing a business impact analysis (BIA) will provide CIOs with an idea of what data supports specific processes. Discover the approach to providing a physical framework to assist in developing a BIA.
Assurance of data integrity is the key to surviving a cyber incident. How do you increase your probability of success?
IBRS advisor Joseph Sweeney was recently featured in an exclusive article discussing a cyber security report released by SailPoint.