Business Continuity Planning for Times of Crisis

February 21, 2024

Head of Cybersecurity for EMEA and APAC, David Dunn, discusses the fundamentals of business continuity, and what steps organizations in Germany should take to protect their business from disaster.

10 Global Cybersecurity Predictions for 2024

January 9, 2024

Anthony J. Ferrante, alongside global leaders and industry experts at FTI Consulting, share their predictions for the most impactful cybersecurity trends to look out for in 2024.

How to Create an Effective Business Continuity Plan

December 7, 2023

A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster. Senior Managing Director Todd Renner provides his expertise on how to create one.

How to Prepare for the Worst

November 10, 2023

In this video, Matt Chevraux, Managing Director, describes how organizations can prepare for worst case scenarios with cybersecurity incident response simulations, as known as table-top exercises.

The Internet of Medical Things and Cybersecurity Risk

July 10, 2023

The healthcare and life sciences industry continues to be plagued by cybersecurity threats. In this article, Robert Stanislaro, Matt Chevraux and Jamie Singer discuss Internet of Medical Things (IoMT) cyber attacks.

5 Ways Security Testing Can Aid Incident Response

May 18, 2023

In this article for Dark Reading, Head of EMEA Cybersecurity David Dunn and Senior Director Nebu Varghese discuss key considerations to build and maintain a cybersecurity testing program.

Critical Data Breach Preparedness to Implement Now

April 3, 2023

In this blog post, David Dunn, Head of Cybersecurity for the EMEA and APAC regions, and Renato Fazzone, Senior Managing Director, explain why companies should prepare for the worst-case scenario as part of their overall disaster recovery plan.

Former FBI Agent Sounds Alarm on Cyber Security

August 7, 2019

Anthony J. Ferrante, Global Head of Cybersecurity, recently sat down with Fordham News to discuss the inception of the International Conference on Cyber Security and his participation at the 2019 event.

Are Dockless Bikes a Cybersecurity Threat?

February 16, 2018

FTI Cybersecurity’s Anthony J. Ferrante discusses the potential security risks associated with dockless bike services based on the financial and mobility data that such services collect in this CityLab article.

Cyberspace Triggers a New Kind of Arms Race

February 1, 2018

FTI Cybersecurity’s Anthony J. Ferrante discusses how the internet is fueling the cyber arms race, allowing malicious cyber actors to deliver weaponized tools at an unprecedented scope and scale in this article featured in Signal Magazine.

Compass Points: The Perils of Data-Sharing

January 31, 2018

In the wake of security concerns over the Strava app, FTI Consulting’s Global Head of Cybersecurity, Anthony J. Ferrante comments on the risks associated with other data-sharing technologies, including dockless bike services in this CityLab article.

Should I Fear the Reaper?

January 17, 2018

In the first of a new series in which FTI Consulting experts answer timely questions about matters affecting business, FTI’s Global Head of Cybersecurity, Anthony J. Ferrante, offers insight about Reaper, a malware that can lie dormant in corporate computer systems.

3 Top Cyber Experts Speaking Out

January 10, 2018

FTI Consulting’s Global Head of Cybersecurity revealed his top three cybersecurity predictions for 2018 which include learning why a surge in IoT issues, the weaponization of cyberspace, and the emergence of new security requirements top his list of concerns in the cyber arena.

Incident Response for Hidden Cobra and State-Sponsored Threats

January 5, 2018

In this article, FTI Consulting’s Global Head of Cybersecurity discusses the issued alerts as well as the importance of staying abreast of the most up-to-date intelligence on this front and organizations building a strong incident response programs to deal with emerging risks from Hidden Cobra and threat actors.

A Look Into the Crystal Ball: Cybersecurity Predictions for 2018

December 27, 2017

In this article, FTI’s Head of Cybersecurity comments on cyberspace becoming the new battlefield for modern warfare, the rise in malicious state-sponsored activity, the exploitation of information as a weapon for financial, political and other gain, and urges cybersecurity professionals to be prepared to stay ahead of malicious actors.

The European Union’s Strategy to Face Cyber Threats

December 7, 2017

In this article, FTI’s Alejandro Sánchez discusses the EC’s strategy and its opportunity to improve cybersecurity preparedness, response and recovery throughout the EU to ensure the security of their increasingly digitized society and, therefore, of the digital single market.

Enhancing Cybersecurity with Big Data Analytics

October 2, 2017

Security information and event management (SIEM) systems actively and continuously collect and document security-related events across an organization, providing a security team with alerts about potential threats or vulnerabilities. Such systems are designed to provide a single view across the massive datasets generated daily regarding an organization’s enterprise security, based on parameters defined by an […]

Cybersecurity Expertise: From the White House to the C-Suite

September 9, 2017

Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity addresses the growing cybersecurity threats affecting U.S. businesses today.  As the former Director for Cyber Incident Response at the U.S. National Security Council and the former Chief of Staff of the Federal Bureau of Investigation’s Cyber Division, Anthony J. Ferrante has seen cyber risk evolve from […]

Battening Down for the Rising Tide of IoT Risks

August 22, 2017

This article discusses how IoT has evolved over the last two decades and the security risks that have emerged as a result. It will include a discussion of the key problems with IoT development and regulation, and the most pressing challenges security professionals need to consider when developing programs that include IoT security. The article also shares proactive steps organizations can take to establish or strengthen these programs.