Blog

Blog2024-11-29T15:40:07+00:00

Blog & Insights

Telecom Namibia Data Breach – Predictable and Avoidable?

Was the Telecom Namibia Data Breach Predictable and Avoidable? A Supply Chain Risk Management Perspective Introduction One Tue 10th, December 2024 a notice was published by a Threat Actor ransomware group called Hunter International stating that Telecom Namibia Limited was allegedly hacked. The objective of this post is to examine

By |December 19th, 2024|Categories: Blog|Tags: , , , |

Ransomware vs. Malware: Key Differences and Security Measures

Ransomware vs. Malware: Key Differences and Security Measures In today's digital age, cyber threats have become increasingly sophisticated and prevalent. Two of the most common cyberattacks are Ransomware and Malware. While both pose significant risks to individuals and organisations, they differ in their objectives and methods. Understanding the key differences

By |December 5th, 2024|Categories: Blog|Tags: , , , |

Digital Operational Resilience Act: Financial Institutions

Digital Operational Resilience Act: Financial Institutions The Digital Operational Resilience Act is a landmark piece of legislation designed to strengthen the cyber security and operational resilience of financial institutions within the European Union. As the financial sector continues to become increasingly digital, the need for robust defences against cyber threats

By |November 22nd, 2024|Categories: Blog|Tags: , , , |

How to Uncover Your Susceptibility to a Ransomware Attack

How to Uncover Your Susceptibility to a Ransomware Attack Ransomware attacks continue to pose a significant threat to organisations worldwide. However, traditional security measures often prove ineffective against increasingly sophisticated attack vectors. In light of this, vulnerability assessment has become more crucial than ever for cyber security teams. A systematic

By |November 7th, 2024|Categories: Blog|Tags: , |

Ransomware: How Susceptible Is Your Organisation? – Part 2

Ransomware: How Susceptible Is Your Organisation? - Part 2 Building upon our previous article, "Ransomware: How Susceptible Is Your Organization? - Part 1," we continue our exploration of this escalating cyber threat. Ransomware attacks have skyrocketed in recent years, causing significant disruption and financial losses to organisations worldwide. This malicious

By |September 23rd, 2024|Categories: Blog|Tags: , , |

Ransomware: How Susceptible Is Your Organisation? – Part 1

Ransomware: How Susceptible Is Your Organisation? - Part 1   Ransomware has become a critical cyber security threat, causing significant disruption and financial losses to organisations worldwide. This malicious software encrypts valuable data, holding it hostage until a ransom is paid, often leaving businesses in a precarious position. The rise

By |September 17th, 2024|Categories: Blog|Tags: , , |

How to Achieve Cyber Resilience Using the NIST Cybersecurity Framework

How to Achieve Cyber Resilience Using the NIST Cybersecurity Framework In today's digital age, cyber threats pose significant risks to organisations of all sizes. The NIST Cybersecurity Framework has emerged as a crucial tool to help businesses enhance their cyber resilience. This comprehensive approach to risk management provides a structured

By |August 22nd, 2024|Categories: Blog|Tags: , |

How to Master Open-Source Intelligence: Tips and Tricks

How to Master Open-Source Intelligence: Tips and Tricks Open-Source Intelligence is the practice of gathering and analysing publicly available data to gain actionable information. Even if you are a cyber security professional, journalist, or simply someone curious about investigative techniques, mastering Open-Source Intelligence allows you to uncover comprehensive data and

By |July 15th, 2024|Categories: Blog|Tags: , |

5-Step Attack Surface Management Guide

5-Step Attack Surface Management Guide As cyber criminals develop ever more sophisticated tactics, proactively managing your attack surface has become an essential defence for organisations of all sizes. Attack surface management isn't just about plugging holes; it's a systematic approach to continuously identify every potential entry point - from internet-facing

By |June 4th, 2024|Categories: Blog|Tags: , , , |

Password Power Up: Your Guide to Online Security

Password Power Up: Your Guide to Online Security Passwords safeguard our social media profiles, financial accounts, and a treasure trove of personal information. A weak password is an open invitation to vulnerability. This following article "Password Power Up: Your Guide to Online Security" will unravel the art of creating robust

By |May 2nd, 2024|Categories: Blog|Tags: , |

8 Surefire Shields Against Ransomware

8 Surefire Shields Against Ransomware In our increasingly digital world, data is the cornerstone of our lives. It stores everything from personal photos to financial records, and for organisations, it is the engine that keeps operations running. But with this dependence comes a growing threat: Ransomware. This malicious software acts

By |March 22nd, 2024|Categories: Blog|Tags: , , |

Elasticito and Phinity Risk Solutions Forge a Dynamic Strategic Partnership

Elasticito and Phinity Risk Solutions Forge a Dynamic Strategic Partnership FOR IMMEDIATE RELEASE Elasticito and Phinity Risk Solutions Forge a Dynamic Strategic Partnership LONDON, 10 NOVEMBER, 2023 – Elasticito, a leading cyber security advisory and solution provider firm, and Phinity Risk Solutions, a prominent provider of integrated risk management services,

By |November 9th, 2023|Categories: Press Release|

5 Best Practices to Succeed in Attack Surface Management

5 Best Practices to Succeed in Attack Surface Management In today's rapidly evolving digital landscape, organisations face an increasing number of cyber threats that can exploit vulnerabilities in their systems. In this article, we will explore five best practices to succeed in attack surface management and safeguard your digital assets.

By |May 30th, 2023|Categories: Blog|Tags: |

Disaster Recovery, Backup and Your Cyber Security Strategy

Disaster Recovery, Backup and Your Cyber Security Strategy In today's digital landscape, protecting your business from cyber threats is of utmost importance. While preventive measures like firewalls and antivirus software are commonly prioritised, disaster recovery (DR) and backup plans are often overlooked. However, integrating robust disaster recovery and backup solutions

By |May 22nd, 2023|Categories: Blog|Tags: , , |

A Practical Guide to Attack Surface Management

Webinar - A Practical Guide to Attack Surface Management Register now A Practical Guide to Attack Surface Management aims to provide practical tips and best practices to help organisations implement a comprehensive and effective attack surface management program. Attack Surface Management is a security practice aimed at identifying,

By |March 6th, 2023|Categories: Events|Tags: |

A Practical Guide to Attack Surface Management

A Practical Guide to Attack Surface Management A Practical Guide to Attack Surface Management aims to provide practical tips and best practices to help organisations implement a comprehensive and effective attack surface management program. Attack Surface Management is a security practice aimed at identifying, managing, and mitigating potential attack vectors

By |February 27th, 2023|Categories: Blog|Tags: |

Swipe Left on Romance Scams This Valentine’s Day

Swipe Left on Romance Scams This Valentine’s Day You might find yourself browsing through profiles on online dating sites in the lead-up to Valentine's Day this year. Can you tell the difference between someone who is simply using a decades-old photo and a lothario scammer trying to swoon their way

By |February 13th, 2023|Categories: Blog|Tags: |

Quantifying Third Party Cyber Risk

Quantifying Third Party Cyber Risk In today's digital age, quantifying third party cyber risk is critical. Organisations of all sizes rely on third parties to provide a variety of services. From cloud computing and data storage to payment processing and customer support. While these partnerships can bring significant benefits, they

Creating a WHOIS Template to Register Domains

Creating a WHOIS Template to Register Domains When a domain name is registered, ICANN requires that personal information including your full name, address, phone number, and email address be provided. This information is then made visible to the public via a WHOIS lookup. In fact, it's available to everyone including

By |January 25th, 2023|Categories: Blog|Tags: , |

Why It Is Important to Assess and Monitor Third Party Risk

Why It Is Important to Assess and Monitor Third Party Risk The handling of risks associated with third parties is essential to avoiding numerous problems. Failing to assess these risks can open up an organisation to supply chain attacks, data breaches and cause reputational damage. Due to these factors, governments

By |January 3rd, 2023|Categories: Blog|Tags: , |

5 Cyber Security Tips to Keep Your Business Safe

5 Cyber Security Tips to Keep Your Business Safe A major concern for CISO's, IT teams, SOC teams and other cyber security personnel during 2022 has been protecting their organisations from cyber security attacks. But are you taking all the necessary steps to keep your organisation's data and online presence

By |November 16th, 2022|Categories: Blog|Tags: |

The Anatomy of a Data Breach

The Anatomy of a Data Breach Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline event, to hackers compromising healthcare records at UC San Diego Health. The last two years

By |October 26th, 2022|Categories: Blog|Tags: |

4 Ways to Use Security Ratings Tools to Automate Risk Assessments

4 Ways to Use Security Ratings Tools to Automate Risk Assessments Your organisation is at risk of being attacked by cyber criminals. It's just a fact of life in this digital age. But how great is the risk you're facing and what can you do to mitigate it? Security ratings

By |October 12th, 2022|Categories: Blog|Tags: , , |

Elasticito Limited Announces Commitment to Growing Global Cyber Security Success by Becoming a Cyber Security Awareness Month 2022 Champion

Elasticito Limited Announces Commitment to Growing Global Cyber Security Success by Becoming a Cyber Security Awareness Month 2022 Champion Building on annual success Cyber Security Awareness Month 2022 is set to highlight the growing importance of cyber security in our daily lives and look to empower everyday individuals and business

By |October 7th, 2022|Categories: News|Tags: , |

3 Steps to Holistic Third-Party Risk Management

3 Steps to Holistic Third-Party Risk Management As businesses increasingly rely on third-party organisations to provide goods and services, it's important for CISOs and risk teams to understand the potential risks involved. If data sharing or interaction with customer data is required, the organisation's exposure to risk can significantly increase.

By |October 4th, 2022|Categories: Blog|Tags: , |

Using Cyber Risk Ratings for DORA Compliance

Using Cyber Risk Ratings for DORA Compliance The number of cyber attacks across the world is on the rise, and the European Union is taking steps to strengthen the IT security of financial institutions such as banks, insurance companies and investment firms. DORA, the Digital Operational Resilience Act, will help

By |September 26th, 2022|Categories: Blog|Tags: , |

7 Questions to Ask About Cyber Insurance

7 Questions to Ask About Cyber Insurance As more and more aspects of our lives move into the digital realm, the risks we face from cyber threats are also increasing. This warrants the need for a plan to protect ourselves from the repercussions of such dangers. Enter the realm of

By |September 20th, 2022|Categories: Blog|Tags: , |

How Do You Determine the Risk Impact of a Vendor?

How Do You Determine the Risk Impact of a Vendor? Vendor risk assessment is an important part of business management. Vendor relationships can deliver value, but they also have risks. A vendor risk assessment is an important step when evaluating the risks your business may be taking with third-party vendors.

By |March 31st, 2022|Categories: Blog|Tags: , |

A Business Perspective of Supply Chain Risk

A Business Perspective of Supply Chain Risk Today's supply chains are just as long, complex, and important as the ancient Silk Road. But where the Silk Road became vital to civilisations of the past, modern supply chains could be their downfall, jeopardising functionality and consequently organisations' reputations. In the interconnected,

By |March 16th, 2022|Categories: Blog|Tags: |

Understanding Cyber Risk Exposure for Vendors in Russia & Ukraine

Understanding Cyber Risk Exposure for Vendors in Russia & Ukraine It was only 60 years ago when the world feared a global nuclear war. Fortunately, we made it through that period. But with geopolitical tensions at an all-time high, the risk of a devastating global cyber war is becoming more

By |March 10th, 2022|Categories: Blog|Tags: , , |

The Business Case for Risk Quantification for Third Parties

The Business Case for Risk Quantification for Third Parties With so many technologies out there, companies need to be smart with how they invest. When it comes to cyber security, if you're not investing in it, you're risking your own success. Cyber security requires monetary investment and attention to implementation

By |March 3rd, 2022|Categories: Blog|Tags: , |

Will conflict in Ukraine raise the risk of cyber attacks in other countries?

  Will conflict in Ukraine raise the risk of cyber attacks in other countries? In a nutshell, the general consensus is, yes. Conflict in Ukraine will raise the risk of cyber attacks in other countries. If as is expected, the situation in Ukraine escalates to all out conflict, we

By |February 13th, 2022|Categories: Blog|Tags: , , |

Data Privacy and the Future of Business

Data Privacy and the Future of Business 2021 was a watershed year in terms of business data use. And 2022 is likely to be another. Therefore, it is imperative that businesses put their best foot forward when it comes to data privacy.  Let's take a look at data privacy and

By |February 10th, 2022|Categories: Blog|Tags: , |

How to Take Back Control of Your Data

How to Take Back Control of Your Data From social media to online shopping, our lives and the digital world become more and more intertwined everyday. And while the digital world has afforded us a whole new level of convenience and access to information, it is imperative that consumers remember

By |February 2nd, 2022|Categories: Blog|Tags: , |

Prioritizing Cyber Security in a Hybrid Workplace

Prioritizing Cyber Security in a Hybrid Workplace In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise

By |October 27th, 2021|Categories: Blog|Tags: , |

Be Cyber Smart this Cyber Security Awareness Month

Be Cyber Smart this Cyber Security Awareness Month Every October, Cyber Security Awareness Month continues to raise awareness about the importance of cyber security around the world. Led by the Cyber Security and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), Cyber Security Awareness Month shares messages

By |October 6th, 2021|Categories: Blog|Tags: |

Human Behavior. Your Biggest Cyber Security Risk?

Human Behavior. Your Biggest Cyber Security Risk? Data breaches, theft, and corruption are an unfortunate reality of the digital world. However, have you ever thought about human behavior? Could it possibly be your biggest cyber security risk? In this era, cyber criminals have created a perfect environment to access sensitive

By |September 22nd, 2021|Categories: Blog|Tags: , |

Celebrate Cyber Security Awareness Month 2021

What are you planning for Cyber Security Awareness Month 2021? Cyber Security Awareness Month is coming up in October. This collaborative effort between government and industry aims to provide all people with the resources they need to stay safe and secure online. What is Cyber Security Awareness Month? Cyber Security

By |September 2nd, 2021|Categories: Blog|Tags: , , |

3 Essential Security Awareness Training Topics for 2021

3 Essential Security Awareness Training Topics for 2021 In 2021, organisations must lead the charge to educate the workforce on cyber security best practice. Threats are growing to become more sophisticated every day, and it is critical for employees to know how to defend their data and systems. Security awareness

By |July 7th, 2021|Categories: Blog|Tags: |

SANS Security Awareness Announces Strategic Relationship with Elasticito

SANS Security Awareness Announces Further Expansion in Europe with Strategic Channel Sales Relationship with Elasticito   North Bethesda, MD, USA and London, UK – 6 JULY, 2021 – SANS Security Awareness, the global leader in providing security awareness training, today announces a new strategic partnership with Elasticito, a leading cyber

By |July 5th, 2021|Categories: Blog|Tags: , |

Post-Pandemic Technology & Cyber Security Trends in Banking – Part 2

Post-Pandemic Technology & Cyber Security Trends in Banking – Part 2 In this second part of our review of key cyber and security-related technology trends in banking in the post-pandemic world, we look at the top cyber threats targeting banking and financial services organisations in 2021. We also look at

By |June 30th, 2021|Categories: Blog|Tags: , , |

Post-Pandemic Technology & Cyber Security Trends in Banking – Part 1

Post-Pandemic Technology & Cyber Security Trends in Banking - Part 1 The banking sector is in the midst of a digital transformation that is causing its attack surface to grow, exposing organisations to increased levels of cyber threat activity. As more organisations adopt digital banking solutions, having effective cybersecurity programs

By |June 23rd, 2021|Categories: Blog|Tags: , , |

Mitigating a Ransomware Attack – Can Security Awareness Training Assist?

Mitigating a Ransomware Attack – Can Security Awareness Training Assist? As the frequency and cost of ransomware attacks continue to rise, solutions for ransomware mitigation and prevention must be at the top of every IT leader and department's list of priorities. Where most see crisis, cybercriminals see opportunity. In this

By |June 16th, 2021|Categories: Blog|Tags: , |

Security Assessment Questionnaire Response Automation

Making the case for Security Assessment Questionnaire Response Automation Business partnerships require trust – without it, success is very difficult to attain. In the current business landscape, however, it's increasingly difficult to tell whether a vendor is trustworthy and deserving of that trust. As information technology becomes more advanced, so

By |May 25th, 2021|Categories: Blog|Tags: , , |

Building the case for Security Validation

Building the case for Security Validation Image credit: USA Today Events of the last month have shown that, despite best efforts and assumptions on how well protected corporate networks are, damaging Ransomware attacks and other cyber threats, continue to wreak havoc on companies and organisations in all industry sectors. Just

10 Tips for Detecting and Mitigating Phishing Attacks

10 Tips for Detecting and Mitigating Phishing Attacks Despite being a well known problem, phishing remains a significant issue for companies. Notwithstanding the increased sophistication of new malware and advanced persistent threats, phishing is still one of the most effective ways to breach networks, steal money and credentials, and exfiltrate

By |May 11th, 2021|Categories: Blog|Tags: , , |

Ransomware: Facts, Risks, and Countermeasures

Ransomware: Facts, Risks, and Countermeasures Ransomware has been a major threat to cyber security in the past few years. The malware encrypts files, locking them and demanding a ransom to unlock them. These ransomware attacks have affected organisations, hospitals, schools, municipalities and enterprises. Ransomware is becoming more sophisticated and difficult

By |May 4th, 2021|Categories: Blog|Tags: , |

Cats, Dogs and Cyber Security

My wife is a cat person.  We have two fluff-ball Ragdoll cats, who are not allowed outside - mainly because we know that they have the capability to scale our garden wall, but probably not the ability to find their way home again! Recently, we adopted a rescue dog.  She

By |April 27th, 2021|Categories: Blog|Tags: , |

The Ransomware Revolution

The Ransomware Revolution In recent years, we’ve seen a fundamental shift in how threat actors approach ransomware. Threat actors today are not as interested in taking credit for encrypting files and escaping with stolen funds or valuable data. They’re more focused on destroying backups and exfiltrating data before they can

By |April 20th, 2021|Categories: Blog|Tags: , |

Security Awareness Training – are organisations doing enough?

Security Awareness Training – are organisations doing enough? Security awareness training is a vital way to prepare employees for the threats that surround them. After all, your employees are your cyber security team's first line of defense. The strength of your cyber security program depends on the security awareness your

By |April 13th, 2021|Categories: Blog|Tags: |

Are dashboards the future of cyber security reporting? Part 1

Are dashboards the future of cyber security reporting? Part 1 Today, C-level executives are making more of an investment in IT security than ever before. In response, information security officers are now regularly needed to report on the security posture of their organisation and communicate their findings to the board.

By |March 31st, 2021|Categories: Blog|Tags: |

4 Tips for a successful cyber threat intelligence program

4 Tips for a successful cyber threat intelligence program The information security threat landscape is constantly evolving, becoming more complex and in many cases, overpowering the security environment. The number of successful hacker attacks each day is increasing. Cyber criminals are continually developing new ways to disrupt organisations via cyberextortion,

By |March 23rd, 2021|Categories: Blog|Tags: |

Vendor Risk Assessments in 60 Minutes

Vendor Risk Assessments in 60 Minutes When  information security teams are overburdened, evaluating vendor and enterprise risks can quickly consume far too much time and budget. Many organisations rely on a one-size-fits-all assessment, delivering a selection of PDF's, MS Word documents, Excel spreadsheets, and emails linking to a variety of

By |March 15th, 2021|Categories: Blog|Tags: , |

Cyber Risk vs Cyber Threat: Are They The Same Thing?

Cyber Risk vs Cyber Threat: Are They The Same Thing? After the term “cyber threat” began to enter common usage, its meaning became a bit fuzzy. The same goes for “risk” — we’ve all heard the term thrown around, but do we really know what it means and how it

By |March 5th, 2021|Categories: Blog|Tags: , |

Risk Assessment vs. Risk Analysis: An Overview

Risk Assessment vs. Risk Analysis: An Overview The recent growth of the extended enterprise has reached a tipping point. That means more organisations are expanding their businesses into the Cloud, staying leaner, and taking advantage of third-party support. At the same time, data breaches are at an all-time high. According

By |February 26th, 2021|Categories: Blog|Tags: , |

How to reduce your cyber risk with the FAIR cyber risk quantification model

How to reduce your cyber risk with the FAIR cyber risk quantification model Cyber risk is very real for organisations, who must constantly manage the risks and threats of cyber related attacks. According to the World Economic Forum's "The Global Risks Report 2021," cyber security failure ranks high among the

By |February 18th, 2021|Categories: Blog|Tags: |

A better way to conduct security assessments?

A better way to conduct security assessments? The vendor security assessment process is too long, inefficient and time consuming.  A much better way to perform vendor security assessments would be to use the body of unbiased content that already exists in most companies: the security policy. Here we show you

By |February 11th, 2021|Categories: Blog|Tags: , |

Simplifying Third-Party Vendor Risk Management

Simplifying Third-Party Vendor Risk Management For many organisations, setting up, managing and maintaining a third-party vendor risk management programme using questionnaires can be a complex, costly and time-consuming exercise. Vendors are often required to respond to similar questionnaires from multiple organisations. For vendors, this can be a tedious and complex

By |February 4th, 2021|Categories: Blog|Tags: |

Attack Surface Management: How To Enable Your Company’s Cyber Defence

Attack Surface Management: How To Enable Your Company's Cyber Defence In a new worldwide digital work landscape accelerated by the Covid-19 pandemic, the threats posed by Shadow IT and attack surface expansion have been turbocharged. The attack surface of businesses has rapidly expanded and includes publicly facing infrastructure, domains, users,

By |January 21st, 2021|Categories: Blog|Tags: |

Ransomware: Develop and Test Your Response Strategy Using Simulation

Ransomware: Develop and Test your Response Strategy Using Simulation In this blog I want to take a look at Simulating a Ransomware Attack and how you would go about developing and testing a Response Strategy. I’ve already covered the basics of a Ransomware attack in this blog article: https://elasticito.com/ransomware-do-you-have-a-tried-and-tested-strategy-in-place/ The

By |October 14th, 2020|Categories: Blog|Tags: , |

Ransomware: Do you have a tried and tested strategy in place?

Ransomware: Do you have a tried and tested strategy in place? With the recent Garmin outage that is still ongoing, which has allegedly been caused by a Ransomware attack, a large number of Executives are going to be asking tough questions about how Ransomware could impact their own organisations, as

By |July 27th, 2020|Categories: Blog|Tags: |

How to Test your Security Controls for Resilience to Australian Cyber Security Centre (ACSC) Advisory 2020-008: Copy-paste Compromises

How to Test your Security Controls for Resilience to Australian Cyber Security Centre (ACSC) Advisory 2020-008: Copy-paste Compromises In conjunction with an announcement by the Australian Prime Minster, Scott Morrison, on National Television, the Australian Cyber Security Centre (ACSC) recently published an advisory (Advisory 2020-008: Copy-paste compromises) giving the MITRE Tactics,

By |July 6th, 2020|Categories: Blog|Tags: |

How to Protect Your Customers and Your Brand from Stolen Credential Misuse

How to Protect Your Customers and Your Brand from Stolen Credential Misuse During 2020 a number of Online Retailers have made headline news due to the media erroneously reporting that their customer Portals had been breached. These include Tesco Clubcard Members (https://www.techradar.com/uk/news/tesco-clubcard-holders-warned-of-major-security-issue) and most recently, Wiggle (https://cyclingindustry.news/security-breach-reported-on-wiggles-customer-accounts). In both these

By |June 17th, 2020|Categories: Blog|Tags: |

Regularly Validating Security Controls with Breach and Attack Simulation

Regularly Validating Security Controls with Breach and Attack Simulation   Validating Security Controls is of vital importance for all organisations and is mandated by Cyber Security Frameworks like National Institute of Standards and Technology (N.I.S.T.) who offer a simple high-level way to do this using 5 steps:   IDENTIFY (CROWN

By |May 18th, 2020|Categories: Blog|Tags: |

You Should Adopt a Cyber Security Framework – Here’s Why

You Should Adopt a Cyber Security Framework – Here’s Why Today, cyber attacks and cyber security breaches are constantly happening around the world. These attacks are also continuously evolving, becoming more sophisticated and unforeseen. This makes it difficult for organisations to proactively prevent phising, malware and ransomware attacks. So what

By |April 29th, 2020|Categories: Blog|Tags: |

Webinar – Automated Breach & Attack Simulation vs Penetration Testing to validate security controls

Webinar - Automated Breach & Attack Simulation vs Penetration Testing to validate security controls Register now Register now

By |March 2nd, 2020|Categories: Events|Tags: |

Webinar: Using the FAIR Model to Quantify Cyber Risk for 3rd Parties

Using the FAIR Model to quantify Cyber Risk for 3rd parties - Recorded webinar View webinar recording Understanding the true and realistic financial impact on the cyber risk that key 3rd party organisations pose to your business has been a hugely complex and expensive challenge to solve. Until

By |February 25th, 2020|Categories: Events|Tags: |

Why use the FAIR Model to quantify Cyber Risk for 3rd parties?

Why use the FAIR Model to quantify Cyber Risk for 3rd parties? Historically, questionnaires and or risk scoring have been the traditional tools used to evaluate the risk a 3rd party poses to an organisation. The Findings from questionnaires and risk scoring are often incredibly technical and complicated and

By |January 28th, 2020|Categories: Blog|Tags: |