How To Build Board Cyber Resilience

December 9, 2025

In this Board Agenda article, Jordan Rae Kelly, Head of Americas Cybersecurity, and David Dunn, Head of EMEA & APAC Cybersecurity, share the importance of putting in place incident response plans before the worst happens.

5 Ways Security Testing Can Aid Incident Response

May 18, 2023

In this article for Dark Reading, Head of EMEA Cybersecurity David Dunn and Senior Director Nebu Varghese discuss key considerations to build and maintain a cybersecurity testing program.

Former FBI Agent Sounds Alarm on Cyber Security

August 7, 2019

Anthony J. Ferrante, Global Head of Cybersecurity, recently sat down with Fordham News to discuss the inception of the International Conference on Cyber Security and his participation at the 2019 event.

Cyberspace Triggers a New Kind of Arms Race

February 1, 2018

FTI Cybersecurity’s Anthony J. Ferrante discusses how the internet is fueling the cyber arms race, allowing malicious cyber actors to deliver weaponized tools at an unprecedented scope and scale in this article featured in Signal Magazine.

Incident Response for Hidden Cobra and State-Sponsored Threats

January 5, 2018

In this article, FTI Consulting’s Global Head of Cybersecurity discusses the issued alerts as well as the importance of staying abreast of the most up-to-date intelligence on this front and organizations building a strong incident response programs to deal with emerging risks from Hidden Cobra and threat actors.

The European Union’s Strategy to Face Cyber Threats

December 7, 2017

In this article, FTI’s Alejandro Sánchez discusses the EC’s strategy and its opportunity to improve cybersecurity preparedness, response and recovery throughout the EU to ensure the security of their increasingly digitized society and, therefore, of the digital single market.

Building an Intelligence-Led Cyber Program

December 6, 2017

This webinar covers how to build a proactive program by mapping out the risk landscape and requirements early; how to lead and drive the process, who to involve and what to include; knowing what to prioritize; conducting a vulnerability assessment and identifying your organization’s critical assets; and offers practical tips for making malicious actors’ jobs harder.

Cyber Resilience in 2018: What to Watch

November 28, 2017

With the rising number of cyber attacks taking place, malicious actors are gaining rapid momentum and becoming increasingly sophisticated. In 2018, cybersecurity professionals can surely expect to see more of the same from this past year, along with a handful of new challenges. In this November 2017 edition of Cyber Defense Magazine, Anthony J. Ferrante, […]

Cyberwar is our era’s Cuban missile crisis. We need to de-escalate, now.

November 24, 2017

Our global landscape has become increasingly digitized, and this increased cyberconnectivity is changing the nature of the threats we face, posing serious implications for our national security. In this Yahoo article, FTI Consulting’s Global Head of Cybersecurity discusses the similarities between cyber and nuclear weapons and how these attacks are capable of imposing catastrophic consequences […]

Why CrashOverride Is a Red Flag for U.S. Power Companies

November 1, 2017

Advanced threat actors — either cyber criminals or nation state hackers — are persistent in looking to conduct demonstrable harm to the national security interests, foreign relations, or economic posture of the U.S. Previous attacks have shown that these people are motivated, highly capable and constantly improving. In this POWER Magazine article, FTI Consulting’s Global […]

Vulnerability Management: A Holistic View

October 30, 2017

In this article, Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity discusses some of this year’s biggest cybersecurity incidents and his thoughts on current and emerging federal policy and legislation around how cybersecurity vulnerabilities are handled through the government’s Vulnerabilities Equities Process (VEP). Learn More >

Enhancing Cybersecurity with Big Data Analytics

October 2, 2017

Security information and event management (SIEM) systems actively and continuously collect and document security-related events across an organization, providing a security team with alerts about potential threats or vulnerabilities. Such systems are designed to provide a single view across the massive datasets generated daily regarding an organization’s enterprise security, based on parameters defined by an […]

How Financial Services Companies Can Win the Fight for Cybersecurity

September 28, 2017

The potential financial impact of a global cyber attack today is on par with that of major natural disasters. Financial institutions have historically been targets of cyber criminal actors looking to steal money, client information and proprietary company data. These attacks have typically targeted customers, but alarmingly, since 2016, there has been an increase in campaigns aimed at breaching financial institutions directly.

Cybersecurity Expertise: From the White House to the C-Suite

September 9, 2017

Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity addresses the growing cybersecurity threats affecting U.S. businesses today.  As the former Director for Cyber Incident Response at the U.S. National Security Council and the former Chief of Staff of the Federal Bureau of Investigation’s Cyber Division, Anthony J. Ferrante has seen cyber risk evolve from […]

Battening Down for the Rising Tide of IoT Risks

August 22, 2017

This article discusses how IoT has evolved over the last two decades and the security risks that have emerged as a result. It will include a discussion of the key problems with IoT development and regulation, and the most pressing challenges security professionals need to consider when developing programs that include IoT security. The article also shares proactive steps organizations can take to establish or strengthen these programs.

Data Breach Prevention and Information Governance Go Hand-In-Hand

October 30, 2016

Information governance (IG) has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data […]