Dec 01, 2023 Plan vs. reality: Strengthening defenses in the cyber arena By Eric Bernardini David Wireman Beth Musumeci Megha Kalsi Dean Weber Lindsey Gyngell +3 more... Show less Mike Tyson famously quipped, "Everyone has a plan until they get punched in the mouth," highlighting the stark difference between theory...
Nov 14, 2023 Transparency and exposure: Demystifying the SEC cybersecurity disclosure rules and materiality By Beth Musumeci Trevor Donelan Stanley Awenlimobor Leo Berrun +1 more... Show less An average of 1,258 cybersecurity attacks occur weekly across global organizations. Enterprises invest over 11% of their annual IT budget...
Oct 17, 2023 No R&R for cybersecurity in hospitality and leisure By Joseph Freeh In an ever-more digital world, the hospitality and leisure industries are flourishing by embracing technology to enhance customer...
Sep 12, 2023 The Rise of Deepfakes: From Virtual Reality to Misinformation By Vaibhav Asher James Goss Aidan Walker Tim Roberts +1 more... Show less In an era where the veracity of visual and audio evidence has historically been taken for granted, the rise of deepfakes presents a...
Jul 05, 2023 Value generation in cyber: Growth, margins, and moving targets By Rahul Gujral Shagun Jain As much of the tech industry resets after years of hypergrowth, investors are searching for areas of continued growth and future...
May 10, 2023 Smart Factory from AlixPartners By Abhinav Agrawal Rob Sterner Steven Hilgendorf Parmesh Bhaskaran Jochen Gottschalk Nicolas Franzwa Anna Del Mar Kate Boddington Barb Schultze +6 more... Show less Connected technologies that drive P&L and ESG impact on the plant floor
Mar 24, 2023 How a precedent-setting court decision raises quandaries for the worlds of crypto-assets and corporate bankruptcy By Colin Johnson Kevin Madura In January, a US bankruptcy judge issued a decision in the ongoing Celsius Network Chapter 11 bankruptcy case, ruling that Celsius was...
Mar 15, 2023 Buyer beware – as the tech landscape continues to shift, consolidation doesn’t always lead to integration By Amir Hosseini I’ve been advising businesses on technology strategy for more than 30 years. In that time, the world of technology has changed almost...
Mar 08, 2023 Seven levers to optimize cybersecurity cost and balance security needs By Megha Kalsi Lukas Weber There are many security leaders across the globe that experience the hardship of budget reduction every year or during uncertain times...
Feb 27, 2023 What is Digital Resilience? By Derek Taylor Uwe Kissmann To paraphrase Frederick the Great, who died in 1786, 'He who defends everything, defends nothing'. Let’s discuss a single word:...
Feb 07, 2023 Five common pitfalls to avoid when governing a security program By Lukas Weber Stanley Awenlimobor During times of economic uncertainty, security budgets risk reductions due to organizational belt-tightening, requiring security teams to...
Jan 25, 2023 Insider threats: Practical steps to prevent a costly breach By James Habben The term “insider threat” is commonly used within the cyber security and information security industries, referring to a risk posed by...
Jan 12, 2023 SEC enforcement actions on text messages require changes to practices By James Habben The SEC routinely pursues enforcement actions against financial institutions for failing to retain text messages and other electronic...
Jan 10, 2023 Cybersecurity Trends for 2023: How to protect your organization from attackers in a recessive economy By Megha Kalsi Nate Morin David Stanton Doing more with less: It's the new shift for cybersecurity. Driven by a looming recession and increased management scrutiny around...
Nov 14, 2022 Digital Trust in Manufacturing – here comes the Chief Product Security Officer By Ismail Mohammed Business leaders often view cybersecurity as a specialized IT role when in reality, it is a subset of enterprise and business risk...
Nov 07, 2022 Mehr als nur Technik: Was Organisationen tun können, um ihre Verwundbarkeit für Cyber-Angriffe zu reduzieren By Daniel Weyh Wie so oft im Leben ist es bei Cyber-Security so, dass Vorbereitung essenziell ist, um einerseits Eintrittswahrscheinlichkeit und...