April 9, 2018
February 16, 2018
January 31, 2018
December 11, 2017
In this POLITICO EU article which discusses the growing security worries derailing the Chinese tech giant, Huawei’s 5G ambitions, FTI’s Head of Cybersecurity comments on the infrastructure of which data flows, government decisions to use Huawei products, and the risks these governments are willing to take.
December 7, 2017
December 6, 2017
This webinar covers how to build a proactive program by mapping out the risk landscape and requirements early; how to lead and drive the process, who to involve and what to include; knowing what to prioritize; conducting a vulnerability assessment and identifying your organization’s critical assets; and offers practical tips for making malicious actors’ jobs harder.
November 28, 2017
With the rising number of cyber attacks taking place, malicious actors are gaining rapid momentum and becoming increasingly sophisticated. In 2018, cybersecurity professionals can surely expect to see more of the same from this past year, along with a handful of new challenges. In this November 2017 edition of Cyber Defense Magazine, Anthony J. Ferrante, […]
November 24, 2017
Our global landscape has become increasingly digitized, and this increased cyberconnectivity is changing the nature of the threats we face, posing serious implications for our national security. In this Yahoo article, FTI Consulting’s Global Head of Cybersecurity discusses the similarities between cyber and nuclear weapons and how these attacks are capable of imposing catastrophic consequences […]
November 1, 2017
Advanced threat actors — either cyber criminals or nation state hackers — are persistent in looking to conduct demonstrable harm to the national security interests, foreign relations, or economic posture of the U.S. Previous attacks have shown that these people are motivated, highly capable and constantly improving. In this POWER Magazine article, FTI Consulting’s Global […]
October 30, 2017
In this article, Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity discusses some of this year’s biggest cybersecurity incidents and his thoughts on current and emerging federal policy and legislation around how cybersecurity vulnerabilities are handled through the government’s Vulnerabilities Equities Process (VEP). Learn More >
The threats to insurers, and all organizations, are growing due to the increasing reliance of business activity on global internet connectivity, as well as the commercialization and professionalization of cyber crime. This potent combination is driving the increased frequency and severity of cyber incidents. In this article featured in Insurance Journal, FTI’s Global Head of […]
September 28, 2017
The potential financial impact of a global cyber attack today is on par with that of major natural disasters. Financial institutions have historically been targets of cyber criminal actors looking to steal money, client information and proprietary company data. These attacks have typically targeted customers, but alarmingly, since 2016, there has been an increase in campaigns aimed at breaching financial institutions directly.
September 11, 2017
Recently, we learned that Equifax was breached via a simple web application weakness, and over 143 million consumers’ records were compromised. These records weren’t salacious emails or leaked Game of Thrones episodes; these were the Social Security numbers, home addresses, and the most sensitive financial data of millions of Americans.
September 9, 2017
Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity addresses the growing cybersecurity threats affecting U.S. businesses today. As the former Director for Cyber Incident Response at the U.S. National Security Council and the former Chief of Staff of the Federal Bureau of Investigation’s Cyber Division, Anthony J. Ferrante has seen cyber risk evolve from […]
August 22, 2017
This article discusses how IoT has evolved over the last two decades and the security risks that have emerged as a result. It will include a discussion of the key problems with IoT development and regulation, and the most pressing challenges security professionals need to consider when developing programs that include IoT security. The article also shares proactive steps organizations can take to establish or strengthen these programs.
October 30, 2016
Information governance (IG) has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data […]