Our latest thinking on the issues that
matter most in risk, governance, compliance and security.

Cyber Intelligence Briefing: 7 May 2021

7 May 2021      5 minute read      Billy Gouveia, Kyle Schwaeble

Cyber Intelligence Briefing: 7 May 2021

7 May 2021     5 minute read   icon-arrow

Cyber Intelligence Briefing: 30 April 2021

30 April 2021      18 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 30 April 2021

30 April 2021     18 minute read   icon-arrow

Insider Threat: A Very Human Affair

26 April 2021      6 minute read      Giles Cockerill CBE

Insider Threat: A Very Human Affair

26 April 2021     6 minute read   icon-arrow

In the Eye of the Storm: Intelligence and the Changing Role of the General Counsel

26 April 2021      1 minute read      Marcus Fishburn

In the Eye of the Storm: Intelligence and the Changing Role of the General Counsel

26 April 2021     1 minute read   icon-arrow

Cyber Intelligence Briefing: 23 April 2021

23 April 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 23 April 2021

23 April 2021     5 minute read   icon-arrow

Cyber Intelligence Briefing: 16 April 2021

16 April 2021      17 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 16 April 2021

16 April 2021     17 minute read   icon-arrow

Cyber Intelligence Briefing: 9 April 2021

9 April 2021      4 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 9 April 2021

9 April 2021     4 minute read   icon-arrow

Cyber Intelligence Briefing: 1 April 2021

1 April 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 1 April 2021

1 April 2021     5 minute read   icon-arrow

Podcast | Optimising Your Cyber Incident Response Plan

29 March 2021    23 minute listen      Lenoy Barkai

Podcast | Optimising Your Cyber Incident Response Plan

29 March 2021   23 minute listen   icon-arrow

Cyber Intelligence Briefing: 26 March 2021

26 March 2021      4 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 26 March 2021

26 March 2021     4 minute read   icon-arrow

How to Build Cyber Confidence

25 March 2021      2 minute read      Lenoy Barkai

How to Build Cyber Confidence

25 March 2021     2 minute read   icon-arrow

Businesses urged to act fast against ProxyLogon attack on Microsoft Exchange Server

24 March 2021      9 minute read      Roddy Priestley, Lukas Weber

Businesses urged to act fast against ProxyLogon attack on Microsoft Exchange Server

24 March 2021     9 minute read   icon-arrow

Cyber Intelligence Briefing: 19 March 2021

19 March 2021      19 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 19 March 2021

19 March 2021     19 minute read   icon-arrow

Cyber Intelligence Briefing: 12 March 2021

12 March 2021      21 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 12 March 2021

12 March 2021     21 minute read   icon-arrow

Cyber Intelligence Briefing: 5 March 2021

5 March 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 5 March 2021

5 March 2021     5 minute read   icon-arrow

Red Flag Bulletin | March 2021

4 March 2021      11 minute read      Martin Devenish MBE, Penelope Jenkins

Red Flag Bulletin | March 2021

4 March 2021     11 minute read   icon-arrow

Cyber Intelligence Briefing: 26 February 2021

26 February 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 26 February 2021

26 February 2021     5 minute read   icon-arrow

Cyber Intelligence Briefing: 19 February 2021

19 February 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 19 February 2021

19 February 2021     5 minute read   icon-arrow

Cyber Intelligence Briefing: 12 February 2021

12 February 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 12 February 2021

12 February 2021     5 minute read   icon-arrow

Cyber Intelligence Briefing: 5 February 2021

5 February 2021      5 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 5 February 2021

5 February 2021     5 minute read   icon-arrow

Cyber Intelligence Briefing: 29 January 2021

29 January 2021      4 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 29 January 2021

29 January 2021     4 minute read   icon-arrow

Cyber Intelligence Briefing: 22 January 2021

22 January 2021      6 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 22 January 2021

22 January 2021     6 minute read   icon-arrow

Cyber Intelligence Briefing: 15 January 2021

15 January 2021      8 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 15 January 2021

15 January 2021     8 minute read   icon-arrow

In Conversation: What Drives Over- and Under-Confidence in Cyber Security?

12 January 2021      5 minute read      Billy Gouveia, Lenoy Barkai

In Conversation: What Drives Over- and Under-Confidence in Cyber Security?

12 January 2021     5 minute read   icon-arrow

In Recovery: The First 24 Hours of a Ransomware Attack, and Beyond

12 January 2021      6 minute read      Joseph Tarraf

In Recovery: The First 24 Hours of a Ransomware Attack, and Beyond

12 January 2021     6 minute read   icon-arrow

“When it Hits the Fan, You Need a Plan”: Getting Incident Response Preparation Right

12 January 2021      4 minute read      Daniel Caplin

“When it Hits the Fan, You Need a Plan”: Getting Incident Response Preparation Right

12 January 2021     4 minute read   icon-arrow

Shockwaves, Ripples and Dominoes: Identifying & Addressing Systemic Cyber Risks

12 January 2021      9 minute read      Lenoy Barkai, Andrew Shaughnessy

Shockwaves, Ripples and Dominoes: Identifying & Addressing Systemic Cyber Risks

12 January 2021     9 minute read   icon-arrow

Q&A: Cyber Confidence & the Legal Risks Associated with a Cyber Security Incident

12 January 2021      7 minute read      Lenoy Barkai

Q&A: Cyber Confidence & the Legal Risks Associated with a Cyber Security Incident

12 January 2021     7 minute read   icon-arrow

When the Virtual and Physical Collide: The Need for a Joint Approach to Cyber and Physical Security

12 January 2021      6 minute read      Mona Damian, Harriet Martin

When the Virtual and Physical Collide: The Need for a Joint Approach to Cyber and Physical Security

12 January 2021     6 minute read   icon-arrow

How to Use Cyber Threat Intelligence to Make Good Decisions

12 January 2021      7 minute read      James Jackson

How to Use Cyber Threat Intelligence to Make Good Decisions

12 January 2021     7 minute read   icon-arrow

Building Cyber Confidence: Simplicity, Visibility and Familiarity

12 January 2021      5 minute read      Jamie Smith, Billy Gouveia

Building Cyber Confidence: Simplicity, Visibility and Familiarity

12 January 2021     5 minute read   icon-arrow

Challenging Insecurity: A Roadmap to Cyber Confidence

12 January 2021      2 minute read      Jamie Smith

Challenging Insecurity: A Roadmap to Cyber Confidence

12 January 2021     2 minute read   icon-arrow

Cyber Intelligence Briefing: 8 January 2021

8 January 2021      9 minute read      Billy Gouveia, Mona Damian

Cyber Intelligence Briefing: 8 January 2021

8 January 2021     9 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 18 December 2020

18 December 2020      5 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 18 December 2020

18 December 2020     5 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 11 December 2020

11 December 2020      8 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 11 December 2020

11 December 2020     8 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 4 December 2020

4 December 2020      6 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 4 December 2020

4 December 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 27 November 2020

27 November 2020      7 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 27 November 2020

27 November 2020     7 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 20 November 2020

20 November 2020      7 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 20 November 2020

20 November 2020     7 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 13 November 2020

13 November 2020      7 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 13 November 2020

13 November 2020     7 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 6 November 2020

6 November 2020      6 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 6 November 2020

6 November 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 30 October 2020

30 October 2020      6 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 30 October 2020

30 October 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 23 October 2020

23 October 2020      8 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 23 October 2020

23 October 2020     8 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 16 October 2020

16 October 2020      6 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 16 October 2020

16 October 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 9 October 2020

9 October 2020      7 minute read      Billy Gouveia, Mona Damian

Cyber Threat Intelligence Briefing: 9 October 2020

9 October 2020     7 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 2 October 2020

2 October 2020      8 minute read      Tyler Oliver, Mona Damian

Cyber Threat Intelligence Briefing: 2 October 2020

2 October 2020     8 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 25 September 2020

25 September 2020      6 minute read      Tyler Oliver, Mona Damian

Cyber Threat Intelligence Briefing: 25 September 2020

25 September 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 18 September 2020

18 September 2020      6 minute read      Tyler Oliver, Mona Damian

Cyber Threat Intelligence Briefing: 18 September 2020

18 September 2020     6 minute read   icon-arrow

Cyber Threat Intelligence Briefing: 11 September 2020

11 September 2020      8 minute read      Tyler Oliver, Mona Damian

Cyber Threat Intelligence Briefing: 11 September 2020

11 September 2020     8 minute read   icon-arrow

Podcast | From Information to Action: The Strategic Value of Cyber Threat Intelligence

8 September 2020    36 minute listen      Tyler Oliver, Mona Damian

Podcast | From Information to Action: The Strategic Value of Cyber Threat Intelligence

8 September 2020   36 minute listen   icon-arrow

7 Characteristics of an Effective Cyber Incident Response Plan

14 August 2020      1 minute read      Joseph Tarraf

7 Characteristics of an Effective Cyber Incident Response Plan

14 August 2020     1 minute read   icon-arrow

Unlocking Value Through Cyber Due Diligence: Key Considerations for Deal Teams

8 July 2020      6 minute read      Andrew Shaughnessy

Unlocking Value Through Cyber Due Diligence: Key Considerations for Deal Teams

8 July 2020     6 minute read   icon-arrow

Facing Fraud, Corruption & Cybercrime in Unprecedented Times

8 July 2020      3 minute read      Martin Devenish MBE

Facing Fraud, Corruption & Cybercrime in Unprecedented Times

8 July 2020     3 minute read   icon-arrow

Dealing in Uncertainty: Diligence & Integrity Risks in a Recovering World

8 July 2020      1 minute read      Martin Devenish MBE

Dealing in Uncertainty: Diligence & Integrity Risks in a Recovering World

8 July 2020     0 minute read   icon-arrow

Timing Is Everything: Return to Work & The Lurking Threat of Ransomware

2 July 2020      6 minute read      Lukas Weber

Timing Is Everything: Return to Work & The Lurking Threat of Ransomware

2 July 2020     6 minute read   icon-arrow

Investigating RobbinHood: An Interview with a Cyber Incident Responder

9 June 2020      5 minute read      James Jackson

Investigating RobbinHood: An Interview with a Cyber Incident Responder

9 June 2020     5 minute read   icon-arrow

Podcast: Have You Password-Protected Your Thermostat? Thinking Ahead About Cyber Security & 5G Technology

27 May 2020    13 minute listen      Billy Gouveia, Lara Getz

Podcast: Have You Password-Protected Your Thermostat? Thinking Ahead About Cyber Security & 5G Technology

27 May 2020   13 minute listen   icon-arrow

Top 10 Technical & Legal Cyber Security Issues amid COVID-19

24 April 2020      1 minute read      Billy Gouveia, Oliver Price

Top 10 Technical & Legal Cyber Security Issues amid COVID-19

24 April 2020     1 minute read   icon-arrow

Cyber Security During the COVID-19 Pandemic: Three Priorities

31 March 2020      10 minute read      Tom Prince

Cyber Security During the COVID-19 Pandemic: Three Priorities

31 March 2020     10 minute read   icon-arrow

Up and Out, In and Down: The Board’s Responsibilities in a Cyber Incident

11 March 2020      8 minute read      Giles Cockerill CBE

Up and Out, In and Down: The Board’s Responsibilities in a Cyber Incident

11 March 2020     8 minute read   icon-arrow

Two Very Different Transactions: Physical Versus Cyber Extortion

11 March 2020      3 minute read      David Lawson

Two Very Different Transactions: Physical Versus Cyber Extortion

11 March 2020     3 minute read   icon-arrow

Legal Representation & Cyber Incident Response: Expert Insights from the US & UK

11 March 2020      11 minute read      Roddy Priestley

Legal Representation & Cyber Incident Response: Expert Insights from the US & UK

11 March 2020     11 minute read   icon-arrow

Here’s the Game Plan: Incident Response and the Role of Cyber Insurance

11 March 2020      7 minute read      Aaron Aanenson

Here’s the Game Plan: Incident Response and the Role of Cyber Insurance

11 March 2020     7 minute read   icon-arrow

Beyond the Technicalities: Cyber Incident Responders and the Importance of Relationships

11 March 2020      9 minute read      Joseph Tarraf, Daniel Caplin

Beyond the Technicalities: Cyber Incident Responders and the Importance of Relationships

11 March 2020     9 minute read   icon-arrow

Who Is Holding Your Data for Ransom? A Conversation with Coveware

11 March 2020      3 minute read      Lenoy Barkai

Who Is Holding Your Data for Ransom? A Conversation with Coveware

11 March 2020     3 minute read   icon-arrow

Cyber Incident Response: Perspectives from Inside the Risk Ecosystem

11 March 2020      3 minute read      Jamie Smith

Cyber Incident Response: Perspectives from Inside the Risk Ecosystem

11 March 2020     3 minute read   icon-arrow

Hackers ‘With Organisation’: The Business of Cybercrime

11 March 2020      12 minute read      The S-RM Ethical Hacking Team

Hackers ‘With Organisation’: The Business of Cybercrime

11 March 2020     12 minute read   icon-arrow

How to Ensure an Effective Cyber Incident Response

11 March 2020      3 minute read      Jamie Smith

How to Ensure an Effective Cyber Incident Response

11 March 2020     3 minute read   icon-arrow

In the Eye of the Storm: Intelligence and the Changing Role of the General Counsel

Today's rapidly evolving risk landscape places more demand than ever on general counsel, who are often found in the ‘eye of the storm’ when their organisation faces a crisis.

DOWNLOAD THE REPORT ➔