header image

Global Risk Bulletin

Lenoy Barkai, Gabrielle Reid 3 June 2019
3 June 2019    Lenoy Barkai, Gabrielle Reid

CYBER INCIDENT RESPONSE: PERSPECTIVES FROM INSIDE THE RISK ECOSYSTEM

In our latest report, we examine a cyber incident from the perspective of several key stakeholders.

Download Report

In this month’s Global Risk Bulletin, we examine the rising threat of far-right extremism in the US and assess the underlying drivers of post-election violence in Indonesia. We also look at the challenges facing health facilities in the DRC amid ongoing attacks by local militias.

 

INCLUDED IN THIS MONTH’S BULLETIN:

THE GROWING THREAT FROM WITHIN: FAR-RIGHT EXTREMISM IN THE US 

The attack against a California synagogue in April 2019 comes amid an uptick in fatal far-right attacks in the US over the last two years. In this article, we examine the nature of the far-right threat in the US, and trace the sources of support and inspiration for radicalised individuals, prompting them to act on their deadly ideologies.

RESULTS REJECTED: JAKARTA'S MAY 2019 RIOTS 

In late May, thousands of supporters of opposition leader Prabowo Subianto demonstrated in Jakarta after he rejected the results of the general election. In this article, we explore the underlying tensions leading to the violent riots, which have already left eight people dead.

COMPLEX EMERGENCIES: CONFLICT AND DISEASE IN THE EASTERN DRC

As NGOs struggle to combat the ongoing Ebola outbreak in the eastern DRC, intermittent attacks by local militias against treatment centres have exacerbated the situation. In this article, we assess who is behind the attacks and why they may be specifically targeting healthcare facilities.

 

Download the PDF

To discuss this article or other industry developments, please reach out to one of our experts.

Lenoy Barkai
Lenoy Barkai Associate Director Email Lenoy
Gabrielle Reid
Gabrielle Reid Senior Associate Email Gabrielle

CYBER INCIDENT RESPONSE: PERSPECTIVES FROM INSIDE THE RISK ECOSYSTEM

In our latest report, we examine a cyber incident from the perspective of several key stakeholders.

Download Report