60 Minutes – Ground Zero in Russia’s Hack of U.S. Election Infrastructure

n Sunday, April 8, 2018, FTI Consulting’s Global Head of Cybersecurity, Anthony J. Ferrante, appeared on the 60 Minutes segment “Ground Zero in Russia's Hack of U.S. Election Infrastructure." As a former Director of Cyber Incident Response on the National Security Council, Anthony discussed election security and lessons learned from Russia’s cyberattack against state voting systems during the 2016 presidential election.

n Sunday, April 8, 2018, FTI Consulting’s Global Head of Cybersecurity, Anthony J. Ferrante, appeared on the 60 Minutes segment “Ground Zero in Russia’s Hack of U.S. Election Infrastructure.” As a former Director of Cyber Incident Response on the National Security Council, Anthony discussed election security and lessons learned from Russia’s cyberattack against state voting systems during the 2016 presidential election.

In this POLITICO EU article which discusses the growing security worries derailing the Chinese tech giant, Huawei’s 5G ambitions, FTI’s Head of Cybersecurity comments on the infrastructure of which data flows, government decisions to use Huawei products, and the risks these governments are willing to take.

The threats to insurers, and all organizations, are growing due to the increasing reliance of business activity on global internet connectivity, as well as the commercialization and professionalization of cyber crime. This potent combination is driving the increased frequency and severity of cyber incidents. In this article featured in Insurance Journal, FTI’s Global Head of […]

Recently, we learned that Equifax was breached via a simple web application weakness, and over 143 million consumers’ records were compromised. These records weren’t salacious emails or leaked Game of Thrones episodes; these were the Social Security numbers, home addresses, and the most sensitive financial data of millions of Americans.

This article discusses how IoT has evolved over the last two decades and the security risks that have emerged as a result. It will include a discussion of the key problems with IoT development and regulation, and the most pressing challenges security professionals need to consider when developing programs that include IoT security. The article also shares proactive steps organizations can take to establish or strengthen these programs.

Information governance (IG) has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data […]