Cryptocurrency and Corporate Security

In this article, originally published by ISSA, FTI Consulting’s Cybersecurity expert Anthony J. Ferrante and Fordham University Professor of Science D. Frank Hsu discuss cryptocurrency and the use of blockchain technology. Learn about the risks associated with cryptocurrency and the process in which organizations should take to strengthen their security stance as it relates to […]

FTI Cybersecurity’s Anthony J. Ferrante discusses the potential security risks associated with dockless bike services based on the financial and mobility data that such services collect in this CityLab article.

In the wake of security concerns over the Strava app, FTI Consulting’s Global Head of Cybersecurity, Anthony J. Ferrante comments on the risks associated with other data-sharing technologies, including dockless bike services in this CityLab article.

Should I Fear the Reaper?

January 17, 2018

In the first of a new series in which FTI Consulting experts answer timely questions about matters affecting business, FTI’s Global Head of Cybersecurity, Anthony J. Ferrante, offers insight about Reaper, a malware that can lie dormant in corporate computer systems.

In this POLITICO EU article which discusses the growing security worries derailing the Chinese tech giant, Huawei’s 5G ambitions, FTI’s Head of Cybersecurity comments on the infrastructure of which data flows, government decisions to use Huawei products, and the risks these governments are willing to take.

This webinar covers how to build a proactive program by mapping out the risk landscape and requirements early; how to lead and drive the process, who to involve and what to include; knowing what to prioritize; conducting a vulnerability assessment and identifying your organization’s critical assets; and offers practical tips for making malicious actors’ jobs harder.

This article discusses how IoT has evolved over the last two decades and the security risks that have emerged as a result. It will include a discussion of the key problems with IoT development and regulation, and the most pressing challenges security professionals need to consider when developing programs that include IoT security. The article also shares proactive steps organizations can take to establish or strengthen these programs.