Connected Risks: Cybersecurity regulations and mitigation approaches in U.S., Europe & Asia

Protecting data is tricky business. Cyberattacks have become a global epidemic and are becoming increasingly more powerful and harder to stop. Organizations, critical infrastructure, and governments are being targeted with timely, sophisticated attacks.

FTI Cybersecurity’s Anthony J. Ferrante discusses the potential security risks associated with dockless bike services based on the financial and mobility data that such services collect in this CityLab article.

In the wake of security concerns over the Strava app, FTI Consulting’s Global Head of Cybersecurity, Anthony J. Ferrante comments on the risks associated with other data-sharing technologies, including dockless bike services in this CityLab article.

In this article, FTI’s Head of Cybersecurity comments on cyberspace becoming the new battlefield for modern warfare, the rise in malicious state-sponsored activity, the exploitation of information as a weapon for financial, political and other gain, and urges cybersecurity professionals to be prepared to stay ahead of malicious actors.

Come Fly the Hackable Skies

October 12, 2017

FTI’s Anthony J. Ferrante is featured in this article Come Fly the Hackable Skies on SecurityInfoWatch.com and outlines a number of proactive measures that the aviation industry and organizations at large can adopt to address emerging cybersecurity threats.

The threats to insurers, and all organizations, are growing due to the increasing reliance of business activity on global internet connectivity, as well as the commercialization and professionalization of cyber crime. This potent combination is driving the increased frequency and severity of cyber incidents. In this article featured in Insurance Journal, FTI’s Global Head of […]

Information governance (IG) has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data […]