Our latest thinking on the issues that
matter most in risk, governance, compliance and security.

Cyber Intelligence Briefing: 19 February 2021

19 February 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 19 February 2021

19 February 2021     5 minute read   icon-arrow

Cyber Intelligence Briefing: 12 February 2021

12 February 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 12 February 2021

12 February 2021     5 minute read   icon-arrow

Cyber Intelligence Briefing: 5 February 2021

5 February 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 5 February 2021

5 February 2021     5 minute read   icon-arrow

Cyber Intelligence Briefing: 29 January 2021

29 January 2021      4 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 29 January 2021

29 January 2021     4 minute read   icon-arrow

Cyber Intelligence Briefing: 22 January 2021

22 January 2021      6 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 22 January 2021

22 January 2021     6 minute read   icon-arrow

Cyber Intelligence Briefing: 15 January 2021

15 January 2021      8 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 15 January 2021

15 January 2021     8 minute read   icon-arrow

In Conversation: What Drives Over- and Under-Confidence in Cyber Security?

12 January 2021      5 minute read      Billy Gouveia, Lenoy Barkai

In Conversation: What Drives Over- and Under-Confidence in Cyber Security?

12 January 2021     5 minute read   icon-arrow

In Recovery: The First 24 Hours of a Ransomware Attack, and Beyond

12 January 2021      6 minute read      Joseph Tarraf

In Recovery: The First 24 Hours of a Ransomware Attack, and Beyond

12 January 2021     6 minute read   icon-arrow

“When it Hits the Fan, You Need a Plan”: Getting Incident Response Preparation Right

12 January 2021      4 minute read      Daniel Caplin

“When it Hits the Fan, You Need a Plan”: Getting Incident Response Preparation Right

12 January 2021     4 minute read   icon-arrow

Shockwaves, Ripples and Dominoes: Identifying & Addressing Systemic Cyber Risks

12 January 2021      9 minute read      Lenoy Barkai, Andrew Shaughnessy

Shockwaves, Ripples and Dominoes: Identifying & Addressing Systemic Cyber Risks

12 January 2021     9 minute read   icon-arrow

Q&A: Cyber Confidence & the Legal Risks Associated with a Cyber Security Incident

12 January 2021      7 minute read      Lenoy Barkai

Q&A: Cyber Confidence & the Legal Risks Associated with a Cyber Security Incident

12 January 2021     7 minute read   icon-arrow

When the Virtual and Physical Collide: The Need for a Joint Approach to Cyber and Physical Security

12 January 2021      6 minute read      Mona Damian, Harriet Martin

When the Virtual and Physical Collide: The Need for a Joint Approach to Cyber and Physical Security

12 January 2021     6 minute read   icon-arrow

How to Use Cyber Threat Intelligence to Make Good Decisions

12 January 2021      7 minute read      James Jackson

How to Use Cyber Threat Intelligence to Make Good Decisions

12 January 2021     7 minute read   icon-arrow

Building Cyber Confidence: Simplicity, Visibility and Familiarity

12 January 2021      5 minute read      Jamie Smith, Billy Gouveia

Building Cyber Confidence: Simplicity, Visibility and Familiarity

12 January 2021     5 minute read   icon-arrow

Challenging Insecurity: A Roadmap to Cyber Confidence

12 January 2021      2 minute read      Jamie Smith

Challenging Insecurity: A Roadmap to Cyber Confidence

12 January 2021     2 minute read   icon-arrow

Cyber Intelligence Briefing: 8 January 2021

8 January 2021      9 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 8 January 2021

8 January 2021     9 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 18 December 2020

18 December 2020      5 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 18 December 2020

18 December 2020     5 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 11 December 2020

11 December 2020      8 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 11 December 2020

11 December 2020     8 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 4 December 2020

4 December 2020      6 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 4 December 2020

4 December 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 27 November 2020

27 November 2020      7 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 27 November 2020

27 November 2020     7 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 20 November 2020

20 November 2020      7 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 20 November 2020

20 November 2020     7 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 13 November 2020

13 November 2020      7 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 13 November 2020

13 November 2020     7 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 6 November 2020

6 November 2020      6 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 6 November 2020

6 November 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 30 October 2020

30 October 2020      6 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 30 October 2020

30 October 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 23 October 2020

23 October 2020      8 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 23 October 2020

23 October 2020     8 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 16 October 2020

16 October 2020      6 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 16 October 2020

16 October 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 9 October 2020

9 October 2020      7 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 9 October 2020

9 October 2020     7 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 2 October 2020

2 October 2020      8 minute read      Tyler Oliver, Mona Damian

Cyber Threat Intelligence Briefing: 2 October 2020

2 October 2020     8 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 25 September 2020

25 September 2020      6 minute read      Tyler Oliver, Mona Damian

Cyber Threat Intelligence Briefing: 25 September 2020

25 September 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 18 September 2020

18 September 2020      6 minute read      Tyler Oliver, Mona Damian

Cyber Threat Intelligence Briefing: 18 September 2020

18 September 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 11 September 2020

11 September 2020      8 minute read      Tyler Oliver, Mona Damian

Cyber Threat Intelligence Briefing: 11 September 2020

11 September 2020     8 minute read   icon-arrow

Podcast | From Information to Action: The Strategic Value of Cyber Threat Intelligence

8 September 2020    36 minute listen      Tyler Oliver, Mona Damian

Podcast | From Information to Action: The Strategic Value of Cyber Threat Intelligence

8 September 2020   36 minute listen   icon-arrow

7 Characteristics of an Effective Cyber Incident Response Plan

14 August 2020      1 minute read      Joseph Tarraf

7 Characteristics of an Effective Cyber Incident Response Plan

14 August 2020     1 minute read   icon-arrow

Unlocking Value Through Cyber Due Diligence: Key Considerations for Deal Teams

8 July 2020      6 minute read      Andrew Shaughnessy

Unlocking Value Through Cyber Due Diligence: Key Considerations for Deal Teams

8 July 2020     6 minute read   icon-arrow

Facing Fraud, Corruption & Cybercrime in Unprecedented Times

8 July 2020      3 minute read      Martin Devenish MBE

Facing Fraud, Corruption & Cybercrime in Unprecedented Times

8 July 2020     3 minute read   icon-arrow

Dealing in Uncertainty: Diligence & Integrity Risks in a Recovering World

8 July 2020      1 minute read      Martin Devenish MBE

Dealing in Uncertainty: Diligence & Integrity Risks in a Recovering World

8 July 2020     0 minute read   icon-arrow

Timing Is Everything: Return to Work & The Lurking Threat of Ransomware

2 July 2020      6 minute read      Lukas Weber

Timing Is Everything: Return to Work & The Lurking Threat of Ransomware

2 July 2020     6 minute read   icon-arrow

Investigating RobbinHood: An Interview with a Cyber Incident Responder

9 June 2020      5 minute read      James Jackson

Investigating RobbinHood: An Interview with a Cyber Incident Responder

9 June 2020     5 minute read   icon-arrow

Podcast: Have You Password-Protected Your Thermostat? Thinking Ahead About Cyber Security & 5G Technology

27 May 2020    13 minute listen      Billy Gouveia, Lara Getz

Podcast: Have You Password-Protected Your Thermostat? Thinking Ahead About Cyber Security & 5G Technology

27 May 2020   13 minute listen   icon-arrow

Top 10 Technical & Legal Cyber Security Issues amid COVID-19

24 April 2020      1 minute read      Billy Gouveia, Oliver Price

Top 10 Technical & Legal Cyber Security Issues amid COVID-19

24 April 2020     1 minute read   icon-arrow

Cyber Security During the COVID-19 Pandemic: Three Priorities

31 March 2020      10 minute read      Tom Prince

Cyber Security During the COVID-19 Pandemic: Three Priorities

31 March 2020     10 minute read   icon-arrow

Up and Out, In and Down: The Board’s Responsibilities in a Cyber Incident

11 March 2020      8 minute read      Giles Cockerill CBE

Up and Out, In and Down: The Board’s Responsibilities in a Cyber Incident

11 March 2020     8 minute read   icon-arrow

Two Very Different Transactions: Physical Versus Cyber Extortion

11 March 2020      3 minute read      David Lawson

Two Very Different Transactions: Physical Versus Cyber Extortion

11 March 2020     3 minute read   icon-arrow

Legal Representation & Cyber Incident Response: Expert Insights from the US & UK

11 March 2020      11 minute read      Roddy Priestley

Legal Representation & Cyber Incident Response: Expert Insights from the US & UK

11 March 2020     11 minute read   icon-arrow

Here’s the Game Plan: Incident Response and the Role of Cyber Insurance

11 March 2020      7 minute read      Aaron Aanenson

Here’s the Game Plan: Incident Response and the Role of Cyber Insurance

11 March 2020     7 minute read   icon-arrow

Beyond the Technicalities: Cyber Incident Responders and the Importance of Relationships

11 March 2020      9 minute read      Joseph Tarraf, Daniel Caplin

Beyond the Technicalities: Cyber Incident Responders and the Importance of Relationships

11 March 2020     9 minute read   icon-arrow

Who Is Holding Your Data for Ransom? A Conversation with Coveware

11 March 2020      3 minute read      Lenoy Barkai

Who Is Holding Your Data for Ransom? A Conversation with Coveware

11 March 2020     3 minute read   icon-arrow

Cyber Incident Response: Perspectives from Inside the Risk Ecosystem

11 March 2020      3 minute read      Jamie Smith

Cyber Incident Response: Perspectives from Inside the Risk Ecosystem

11 March 2020     3 minute read   icon-arrow

Hackers ‘With Organisation’: The Business of Cybercrime

11 March 2020      12 minute read      The S-RM Ethical Hacking Team

Hackers ‘With Organisation’: The Business of Cybercrime

11 March 2020     12 minute read   icon-arrow

How to Ensure an Effective Cyber Incident Response

11 March 2020      3 minute read      Jamie Smith

How to Ensure an Effective Cyber Incident Response

11 March 2020     3 minute read   icon-arrow

Red Flag Bulletin

31 July 2019      7 minute read      Rachel Coyle MBE

Red Flag Bulletin

31 July 2019     7 minute read   icon-arrow

Challenging Insecurity: A Roadmap to Cyber Confidence

In our latest report, we demystify the drivers of insecurity among cyber security professionals, in so doing, mapping a path to cyber confidence.

DOWNLOAD THE REPORT ➔