Insights

In this Security Magazine article, Global Head of Cybersecurity Anthony J. Ferrante and Director Matt McManus discuss the current threat to the open Internet and the path to de-escalating global tensions.

Researchers have detected a new Golang-based worm that is targeting Windows and Linux servers with monero cryptomining malware. In this InfoRisk Today article, Kyung Kim comments on how the Golang malware works and its use among threat actors.

In December’s edition of the FTI Cybersecurity Briefing Book, read about staying secure during the holidays, urgent guidance regarding nation-state attacks, thought leadership, and recent and upcoming events.

The global leaders of FTI Cybersecurity analyzed major developments from their respective regions — including the fallout of the U.S. Presidential Election, Brexit, and the upcoming Tokyo Olympics — to forecast what to expect in the coming year.

Future Trends

December 17, 2020

In this episode of The Expert Briefing podcast, our experts are joined by special guest Ed Vaizey (a member of the House of Lords and formerly the UK Government’s longest-serving Culture and Digital Minister) to discuss future trends in cybersecurity.

In this episode of The Expert Briefing podcast, our experts are joined by Lieutenant Colonel Erica Mitchell and Lieutenant Colonel Doug Fletcher from the United States Military Academy at West Point to discuss the evolving threats impacting critical infrastructure and how the recent Jack Voltaic research exercise has helped to prepare for the worst.

In October’s edition of the FTI Cybersecurity Briefing Book, read about Cybersecurity Awareness Month, a recent OFAC alert, our ransomware capabilities, thought leadership, and recent and upcoming events.

In a world where hackers can change a satellite’s orbit, or youngsters honing their cyber skills can cause huge disruptions, organizations need to be more vigilant than ever when protecting operational technology. In this FTI Journal article, Paul Reilly shares five ways an organization can remain resilient and keep its OT secure.

In this episode of The Expert Briefing podcast, experts discuss the changing cybersecurity landscape across Asia. They provide valuable insight into the evolving cybersecurity threats currently facing the region and offer their guidance for business leaders to help build resilience.

Most of us consider the minicomputer we carry in our pockets to be a direct line for managing various parts of our personal and professional lives. Cyber criminals look at our smartphones through a different lens. They see a veritable treasure chest of data and information for the taking. In this FTI Journal article, David Dunn and Jonathan Snyder present essential best practices for securing your mobile device at home and on the job.

Election meddling threatens the right to vote that so many groups have fought for, yet little is being done to prevent a repeat attack — or worse — in this year’s election. In this op-ed for The Hill, Global Head of Cybersecurity Anthony J. Ferrante discusses why the U.S. presidential election is under attack.

In this episode of The Expert Briefing podcast, our experts discuss the cyber threats stemming from COVID-19 and offer advice on what steps organizations and business leaders should be taking to build cybersecurity resilience and mitigate risk.

Internet-connected devices, programs, and apps are ubiquitous in today’s world and provide conveniences to our daily lives. But all that convenience comes with a price. In this FTI Journal article, Ron Yearwood and Dave Best present best practices for protecting your connected devices.

In this FTI Journal article, Kyung Kim, Head of Cybersecurity for the APAC region, looks at the five steps companies should take when they discover an insider is responsible for a cyber breach.

The U.S. Army Cyber Institute partnered with FTI Consulting to host a virtual exercise, known as Jack Voltaic 3.0, that tested the abilities of Charleston, South Carolina and Savannah, Georgia to respond to a simulated cyber attack. The simulation combined digital attacks with physical disruptions to gauge defenses and response tactics.

In this FTI Journal article, Managing Director Steve Morgan provides 5 top tips for business leaders on how to mitigate the risk of insider threat. In today’s digital age — where hackers can override a system from the other side of the globe — organizations must be warier than ever. Unfortunately, it’s no longer enough to remain vigilant of the outside world. Some of the most damaging threats originate from within.

Insider Threat

September 11, 2020

In this episode of The Expert Briefing podcast, the experts delve into the topic of insider threat, discussing how awareness training, coordinated communication channels, and education programs help mitigate the risk. Throughout the episode, they offer their guidance on the current trends and real-life examples they are seeing.

Reopening With Care

September 9, 2020

In this episode of The Expert Briefing podcast, Ken Jones is in conversation with colleagues Elizabeth Cholis, Jordan Rae Kelly, and Lisa O’Connor. They discuss the key considerations for business leaders and provide guidance as to how organizations can make a successful transition to a post-COVID world.

Women in Cybersecurity

August 28, 2020

In this episode of The Expert Briefing podcast, the conversation explores each guests’ differing roles and paths which led them to a career within cybersecurity, the obstacles they have overcome, and honest advice to women who are wishing to pursue a career within the industry.

In July’s edition of the FTI Cybersecurity Briefing Book, read about COVID-19 trends, our new Reopening with Care offering, recent thought leadership, and recent and upcoming events.

In this episode of The Expert Briefing podcast, our experts discuss their observations on the current climate when it comes to cyber incidents and crisis response. The conversation delves deeper and offers a step by step guide on how organizations can best prepare for a future cyber incident and work to improve their crisis preparedness.

Head of Cybersecurity for the EMEIA region Joshua Burch has written a white paper entitled ‘Not If But When: Building Cybersecurity Resilience to Secure Competitive Advantage’, where he sketches out the building blocks for constructing cybersecurity resilience, focusing on strategic risk management, cultural change, leadership, and effective communication. This isn’t a technical blueprint, but rather Joshua explores what it takes in today’s world to build an organisation with cybersecurity resilience at its core.

In this Thomson Reuters Regulatory Intelligence article, Gita Shivarattan, Jake Green, and Tom Brookes from Ashurst LLP and Paul Reilly and Patrick MacGloin from FTI Consulting explain the key phases of a cyber incident response and summarize the regulatory reporting and notification obligations which may be triggered when a cyber incident involves a personal data breach.