January 11, 2021
January 6, 2021
January 4, 2021
December 29, 2020
December 21, 2020
December 17, 2020
November 30, 2020
November 11, 2020
In this episode of The Expert Briefing podcast, our experts are joined by Lieutenant Colonel Erica Mitchell and Lieutenant Colonel Doug Fletcher from the United States Military Academy at West Point to discuss the evolving threats impacting critical infrastructure and how the recent Jack Voltaic research exercise has helped to prepare for the worst.
October 30, 2020
In a world where hackers can change a satellite’s orbit, or youngsters honing their cyber skills can cause huge disruptions, organizations need to be more vigilant than ever when protecting operational technology. In this FTI Journal article, Paul Reilly shares five ways an organization can remain resilient and keep its OT secure.
October 13, 2020
October 13, 2020
Most of us consider the minicomputer we carry in our pockets to be a direct line for managing various parts of our personal and professional lives. Cyber criminals look at our smartphones through a different lens. They see a veritable treasure chest of data and information for the taking. In this FTI Journal article, David Dunn and Jonathan Snyder present essential best practices for securing your mobile device at home and on the job.
October 11, 2020
Election meddling threatens the right to vote that so many groups have fought for, yet little is being done to prevent a repeat attack — or worse — in this year’s election. In this op-ed for The Hill, Global Head of Cybersecurity Anthony J. Ferrante discusses why the U.S. presidential election is under attack.
October 2, 2020
October 2, 2020
September 30, 2020
September 29, 2020
September 24, 2020
The U.S. Army Cyber Institute partnered with FTI Consulting to host a virtual exercise, known as Jack Voltaic 3.0, that tested the abilities of Charleston, South Carolina and Savannah, Georgia to respond to a simulated cyber attack. The simulation combined digital attacks with physical disruptions to gauge defenses and response tactics.
In this Thomson Reuters Regulatory Intelligence article, FTI Consulting’s Head of Cybersecurity for APAC Kyung Kim discusses how organizations across the APAC region can take steps to mitigate the risk of a cybersecurity incident, looking at the cultural and regulatory implications and how trends in Singapore compare with South East Asia.
September 21, 2020
In this FTI Journal article, Managing Director Steve Morgan provides 5 top tips for business leaders on how to mitigate the risk of insider threat. In today’s digital age — where hackers can override a system from the other side of the globe — organizations must be warier than ever. Unfortunately, it’s no longer enough to remain vigilant of the outside world. Some of the most damaging threats originate from within.
September 11, 2020
In this episode of The Expert Briefing podcast, the experts delve into the topic of insider threat, discussing how awareness training, coordinated communication channels, and education programs help mitigate the risk. Throughout the episode, they offer their guidance on the current trends and real-life examples they are seeing.
September 9, 2020
In this episode of The Expert Briefing podcast, Ken Jones is in conversation with colleagues Elizabeth Cholis, Jordan Rae Kelly, and Lisa O’Connor. They discuss the key considerations for business leaders and provide guidance as to how organizations can make a successful transition to a post-COVID world.
August 28, 2020
August 28, 2020
July 31, 2020
July 29, 2020
In this episode of The Expert Briefing podcast, our experts discuss their observations on the current climate when it comes to cyber incidents and crisis response. The conversation delves deeper and offers a step by step guide on how organizations can best prepare for a future cyber incident and work to improve their crisis preparedness.
Head of Cybersecurity for the EMEIA region Joshua Burch has written a white paper entitled ‘Not If But When: Building Cybersecurity Resilience to Secure Competitive Advantage’, where he sketches out the building blocks for constructing cybersecurity resilience, focusing on strategic risk management, cultural change, leadership, and effective communication. This isn’t a technical blueprint, but rather Joshua explores what it takes in today’s world to build an organisation with cybersecurity resilience at its core.
In this Thomson Reuters Regulatory Intelligence article, Gita Shivarattan, Jake Green, and Tom Brookes from Ashurst LLP and Paul Reilly and Patrick MacGloin from FTI Consulting explain the key phases of a cyber incident response and summarize the regulatory reporting and notification obligations which may be triggered when a cyber incident involves a personal data breach.