Ronan Lavelle

About Ronan Lavelle CEO, Elasticito

This author has not yet filled in any details.
So far Ronan Lavelle CEO, Elasticito has created 8 blog entries.

Quantifying Third Party Cyber Risk

Quantifying Third Party Cyber Risk In today's digital age, quantifying third party cyber risk is critical. Organisations of all sizes rely on third parties to provide a variety of services. From cloud computing and data storage to payment processing and customer support. While these partnerships can bring significant benefits, they also introduce cyber risk to an organisation. A data breach or cyber attack that targets one of your third parties can expose sensitive data or disrupt business operations. Leading to reputational damage, financial losses, and regulatory penalties. Therefore, it is crucial for organisations to effectively quantify and manage third party cyber risk. What is third party cyber risk? Third party cyber risk refers to the potential vulnerabilities and threats that arise from an organisation's use of external service providers and partners. These risks can come in various forms, including: Data breaches Unauthorised access to systems Ransomware attacks, and Supply chain

By |2023-03-30T17:09:13+00:00January 30th, 2023|Blog|Comments Off on Quantifying Third Party Cyber Risk

4 Ways to Use Security Ratings Tools to Automate Risk Assessments

4 Ways to Use Security Ratings Tools to Automate Risk Assessments Your organisation is at risk of being attacked by cyber criminals. It's just a fact of life in this digital age. But how great is the risk you're facing and what can you do to mitigate it? Security ratings tools are an essential part of any good cyber risk management strategy. These tools help organisations understand, control and mitigate all forms of cyber risk. They are so vital, in fact, that they stand as critical components of an effective data protection and risk management strategy. With more and more businesses relying on digital systems for day-to-day operations, the potential for new vulnerabilities also grows — which means greater risks for everyone involved. Here are "4 ways to use security ratings tools to automate risk assessments" which will enable the minimisation of your cyber security risks. Introduction The way that

By |2023-03-30T17:09:14+00:00October 12th, 2022|Blog|Comments Off on 4 Ways to Use Security Ratings Tools to Automate Risk Assessments

Will conflict in Ukraine raise the risk of cyber attacks in other countries?

  Will conflict in Ukraine raise the risk of cyber attacks in other countries? In a nutshell, the general consensus is, yes. Conflict in Ukraine will raise the risk of cyber attacks in other countries. If as is expected, the situation in Ukraine escalates to all out conflict, we can expect significant offensive cyber operations against Ukrainian government, utility and industrial targets and targets beyond Ukraine as well. Not NotPetya again? As we saw in 2017 with the NotPetya Ransomware campaign, which was aimed at Ukrainian companies via a popular local accounting software platform, that was widely attributed to Russian threat actors in the wake of the Crimean peninsula annexation, cyber attacks can spread in an uncontrolled manner, even when the threat actor is not specifically targeting a wider audience. NotPetya ended up seriously affecting the business operations of hundreds of companies around the world, including A.P. Møller-Mærsk (who

By |2023-03-30T17:09:15+00:00February 13th, 2022|Blog|Comments Off on Will conflict in Ukraine raise the risk of cyber attacks in other countries?

Post-Pandemic Technology & Cyber Security Trends in Banking – Part 2

Post-Pandemic Technology & Cyber Security Trends in Banking – Part 2 In this second part of our review of key cyber and security-related technology trends in banking in the post-pandemic world, we look at the top cyber threats targeting banking and financial services organisations in 2021. We also look at some of the emerging cyber technologies being adopted and considered by banking and financial services organisations around the world. Over the last decade, cyber attacks have become an ever-growing threat for banks. Technology has advanced rapidly and threat actors have learned that banks are a lucrative target. Threat actors have evolved their techniques to make it difficult for any company to fend off the attacks. Cybersecurity is not an issue limited to industries involving technology only. It holds a critical value in banking since banks make millions of transactions each day, most of which are done on digital payment platforms. Without

By |2023-03-30T17:09:33+00:00June 30th, 2021|Blog|Comments Off on Post-Pandemic Technology & Cyber Security Trends in Banking – Part 2

Post-Pandemic Technology & Cyber Security Trends in Banking – Part 1

Post-Pandemic Technology & Cyber Security Trends in Banking - Part 1 The banking sector is in the midst of a digital transformation that is causing its attack surface to grow, exposing organisations to increased levels of cyber threat activity. As more organisations adopt digital banking solutions, having effective cybersecurity programs has become more important than ever before for the banking industry. In this article we explore the post-pandemic technology and cyber security trends in banking.   Elasticito was recently approached by a financial services firm to provide some analysis on new technology and cyber trends within the banking and financial services industry.  A summary of our findings make up this blog post, but one common theme that we observed was that, despite the pandemic, the unstoppable momentum of digital transformation is causing a huge impact in the way that banking services are and will be delivered to customers over the

By |2023-03-30T17:09:33+00:00June 23rd, 2021|Blog|Comments Off on Post-Pandemic Technology & Cyber Security Trends in Banking – Part 1

Building the case for Security Validation

Building the case for Security Validation Image credit: USA Today Events of the last month have shown that, despite best efforts and assumptions on how well protected corporate networks are, damaging Ransomware attacks and other cyber threats, continue to wreak havoc on companies and organisations in all industry sectors. Just in the last month, we have seen crippling Ransomware attacks on Colonial Pipeline, the Irish Health Service, the University of Portsmouth, and many others.  In most, if not all, of these cases, the IT and information security teams will undoubtedly have told their management teams and oversight Boards, that they had invested in adequate security controls and that they conduct regular penetration testing. So, it begs the question: why are corporate networks still so vulnerable to these attacks?  The answers to this are probably wide ranging, but one consistent theme is an assumption that corporate networks are protected because certain

By |2023-03-30T17:09:33+00:00May 18th, 2021|Blog|Comments Off on Building the case for Security Validation

Cats, Dogs and Cyber Security

My wife is a cat person.  We have two fluff-ball Ragdoll cats, who are not allowed outside - mainly because we know that they have the capability to scale our garden wall, but probably not the ability to find their way home again! Recently, we adopted a rescue dog.  She is however, allowed into the garden; much to the chagrin of the cats.  This is because, to our knowledge, we do not believe that the dog has the capability of scaling our outer perimeter. In the information security world, we at Elasticito, spend a lot of time working with information security teams and senior management helping them to understand and manage cyber risks, threats and threat actor capabilities within the context of their businesses.  It seems to me, that the complex world of cyber security is actually not much more complex than the dynamics between cats, dogs and garden fences.

By |2023-03-30T17:09:34+00:00April 27th, 2021|Blog|Comments Off on Cats, Dogs and Cyber Security

Webinar: Using the FAIR Model to Quantify Cyber Risk for 3rd Parties

Using the FAIR Model to quantify Cyber Risk for 3rd parties - Recorded webinar View webinar recording Understanding the true and realistic financial impact on the cyber risk that key 3rd party organisations pose to your business has been a hugely complex and expensive challenge to solve. Until now. Join this webinar to learn more about how NormShield has incorporated the Fair® cyber risk quantification model into its cyber risk assessment platform to provide instant and dynamic visibility of the financial impact and likelihood of a breach with 3rd parties that you do business with. If your business could be affected by a major cyber incident with one of your 3rd parties, you should attend this session. Suggested audience: - CISOs - Cyber risk/GRC specialists - Third Party Risk Managers - IT Governance professionals View webinar recording

By |2023-03-30T17:09:54+00:00February 25th, 2020|Events|Comments Off on Webinar: Using the FAIR Model to Quantify Cyber Risk for 3rd Parties