The Insiders: Cybersecurity

Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity, recently spoke with Corporate Board Member about how companies can help manage cyber risks by regularly enlisting independent advisors to identify security flaws.

Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity, recently spoke with Corporate Board Member about how companies can help manage cyber risks by regularly enlisting independent advisors to identify security flaws.

Should I Fear the Reaper?

January 17, 2018

In the first of a new series in which FTI Consulting experts answer timely questions about matters affecting business, FTI’s Global Head of Cybersecurity, Anthony J. Ferrante, offers insight about Reaper, a malware that can lie dormant in corporate computer systems.

FTI Consulting’s Global Head of Cybersecurity revealed his top three cybersecurity predictions for 2018 which include learning why a surge in IoT issues, the weaponization of cyberspace, and the emergence of new security requirements top his list of concerns in the cyber arena.

In this article, FTI’s Head of Cybersecurity comments on cyberspace becoming the new battlefield for modern warfare, the rise in malicious state-sponsored activity, the exploitation of information as a weapon for financial, political and other gain, and urges cybersecurity professionals to be prepared to stay ahead of malicious actors.

The threats to insurers, and all organizations, are growing due to the increasing reliance of business activity on global internet connectivity, as well as the commercialization and professionalization of cyber crime. This potent combination is driving the increased frequency and severity of cyber incidents. In this article featured in Insurance Journal, FTI’s Global Head of […]

This article discusses how IoT has evolved over the last two decades and the security risks that have emerged as a result. It will include a discussion of the key problems with IoT development and regulation, and the most pressing challenges security professionals need to consider when developing programs that include IoT security. The article also shares proactive steps organizations can take to establish or strengthen these programs.