December 9, 2025
In this Board Agenda article, Jordan Rae Kelly, Head of Americas Cybersecurity, and David Dunn, Head of EMEA & APAC Cybersecurity, share the importance of putting in place incident response plans before the worst happens.
September 24, 2025
In September 2025, the U.S. Secret Service discovered and dismantled a large network of electronic devices in New York city, consisting of more than 300 co-located SIM servers and 100,000 SIM cards.
March 27, 2025
Our experts highlight the real threats behind the attacks highlighted in the new Netflix show, “Zero Day.”
February 26, 2025
In this video, Senior Managing Director Eva Kwok provides guidance on how to effectively handle a cybersecurity incident.
October 23, 2024
In this video, FTI Australian experts describe the important steps that should be taken by an organization in the aftermath of a cybersecurity incident.
October 22, 2024
Managing Director Ryan Smyth discusses how organizations can leverage a cybersecurity incident to improve their security posture and mitigate the risk of future incidents.
October 15, 2024
Australian experts Wouter Veugelen, Ben Hamilton, Michael Khoury, and Tim De Sousa outline the immediate steps organizations should take when they become aware of a critical cybersecurity incident.
September 11, 2024
Head of Cybersecurity for EMEA and APAC David Dunn comments on the importance of involving in-house counsel in the incident response planning process.
August 23, 2024
In this article for the Wall Street Journal, Head of Cybersecurity for the Americas Jordan Rae Kelly comments on the risks of ransom payment bans.
July 23, 2024
On July 19, a flawed update associated with CrowdStrike Falcon caused widespread outages affecting numerous Windows systems worldwide. Our experts provided commentary on the outage across multiple global news outlets.
June 27, 2024
Managing Director Adam Harrison provides commentary on the key considerations for organizations when designing an incident response strategy.
February 12, 2024
In this video, Senior Managing Director Tracy Wilkison shares her expert perspective on the key role of civil litigation investigations in cybersecurity.
December 19, 2023
Jordan Rae Kelly comments on the challenge of identifying hackers, and how catching their mistakes is often the key to unveiling their identities.
October 12, 2023
According to recent FTI research, 70% of healthcare leaders experienced a cybersecurity incident last year. Prepare today.
August 28, 2023
What should you do after your organization has a cybersecurity incident? Here are 4 common mistakes to avoid.
May 18, 2023
In this article for Dark Reading, Head of EMEA Cybersecurity David Dunn and Senior Director Nebu Varghese discuss key considerations to build and maintain a cybersecurity testing program.
June 1, 2021
In light of recent global press coverage of nation-state cyber attacks and third-party application security concerns, FTI Cybersecurity is issuing immediate actionable intelligence.
April 12, 2021
In light of recent global press coverage of nation-state cyber attacks and third-party application security concerns, FTI Cybersecurity is issuing immediate actionable intelligence.
August 7, 2019
Anthony J. Ferrante, Global Head of Cybersecurity, recently sat down with Fordham News to discuss the inception of the International Conference on Cyber Security and his participation at the 2019 event.
February 1, 2018
FTI Cybersecurity’s Anthony J. Ferrante discusses how the internet is fueling the cyber arms race, allowing malicious cyber actors to deliver weaponized tools at an unprecedented scope and scale in this article featured in Signal Magazine.
January 5, 2018
In this article, FTI Consulting’s Global Head of Cybersecurity discusses the issued alerts as well as the importance of staying abreast of the most up-to-date intelligence on this front and organizations building a strong incident response programs to deal with emerging risks from Hidden Cobra and threat actors.
December 7, 2017
In this article, FTI’s Alejandro Sánchez discusses the EC’s strategy and its opportunity to improve cybersecurity preparedness, response and recovery throughout the EU to ensure the security of their increasingly digitized society and, therefore, of the digital single market.
December 6, 2017
This webinar covers how to build a proactive program by mapping out the risk landscape and requirements early; how to lead and drive the process, who to involve and what to include; knowing what to prioritize; conducting a vulnerability assessment and identifying your organization’s critical assets; and offers practical tips for making malicious actors’ jobs harder.
November 28, 2017
With the rising number of cyber attacks taking place, malicious actors are gaining rapid momentum and becoming increasingly sophisticated. In 2018, cybersecurity professionals can surely expect to see more of the same from this past year, along with a handful of new challenges. In this November 2017 edition of Cyber Defense Magazine, Anthony J. Ferrante, […]
November 24, 2017
Our global landscape has become increasingly digitized, and this increased cyberconnectivity is changing the nature of the threats we face, posing serious implications for our national security. In this Yahoo article, FTI Consulting’s Global Head of Cybersecurity discusses the similarities between cyber and nuclear weapons and how these attacks are capable of imposing catastrophic consequences […]
November 1, 2017
Advanced threat actors — either cyber criminals or nation state hackers — are persistent in looking to conduct demonstrable harm to the national security interests, foreign relations, or economic posture of the U.S. Previous attacks have shown that these people are motivated, highly capable and constantly improving. In this POWER Magazine article, FTI Consulting’s Global […]
October 30, 2017
In this article, Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity discusses some of this year’s biggest cybersecurity incidents and his thoughts on current and emerging federal policy and legislation around how cybersecurity vulnerabilities are handled through the government’s Vulnerabilities Equities Process (VEP). Learn More >
October 2, 2017
Security information and event management (SIEM) systems actively and continuously collect and document security-related events across an organization, providing a security team with alerts about potential threats or vulnerabilities. Such systems are designed to provide a single view across the massive datasets generated daily regarding an organization’s enterprise security, based on parameters defined by an […]
September 28, 2017
The potential financial impact of a global cyber attack today is on par with that of major natural disasters. Financial institutions have historically been targets of cyber criminal actors looking to steal money, client information and proprietary company data. These attacks have typically targeted customers, but alarmingly, since 2016, there has been an increase in campaigns aimed at breaching financial institutions directly.
September 9, 2017
Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity addresses the growing cybersecurity threats affecting U.S. businesses today. As the former Director for Cyber Incident Response at the U.S. National Security Council and the former Chief of Staff of the Federal Bureau of Investigation’s Cyber Division, Anthony J. Ferrante has seen cyber risk evolve from […]
August 22, 2017
This article discusses how IoT has evolved over the last two decades and the security risks that have emerged as a result. It will include a discussion of the key problems with IoT development and regulation, and the most pressing challenges security professionals need to consider when developing programs that include IoT security. The article also shares proactive steps organizations can take to establish or strengthen these programs.
October 30, 2016
Information governance (IG) has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data […]
You must be logged in to post a comment.