The Transformation of Information Security: New Threats and Vulnerabilities
Adrian Davis
Introduction: The Next Frontier of Risk Management: Cyber Risk
A Proposed Business-Oriented Approach to Cyber
A Practical Approach to Developing a Cybersecurity Programme
Regulations, Compliance and Cyber Risk Management
The Role of Cyber Risk in the Organisation
The Evolution of the Cyber Risk Role within the Three Lines of Defence
Quantifying Cyber Risk
Leadership and Culture: The Foundations of Cyber-Risk Management
Understanding the Cyber Risk Landscape: An Integrated Framework
The Transformation of Information Security: New Threats and Vulnerabilities
Cybersecurity Metrics: The Good, the Bad and the Ugly
Third-Party Risk Management
Cybersecurity’s Neighbourhood Watch: The Strength of Information Sharing
Cyber Risks in Business Continuity Management and Supply Chain Resilience for Financial Institutions
Cybersecurity Threats to the Critical Infrastructure
The True Meaning of Cyber Incident Response
Cyber Risk: Where We Have Been, Where We Are and Where We Are Going
INTRODUCTION
With attacks such as ransomware, viruses and phishing hitting the headlines daily, executives, business, IT and information security professionals have their hands full with today’s problems. But we must also look to the future and prepare for it; actively consider how we can protect our organisations and the information they use as technology and the ways in which technology and information are used change.
Changes in technology and new approaches such as Industry 4.0 and the Internet of Things will impact society and commerce now and in the future, providing great opportunities but offering new or different routes for malicious activities. It is easy to fall into the trap of focusing on technologies and attacks such as anti-malware, phishing, APT, RATs and so on when discussing malicious activities, threats and vulnerabilities. But, to fully understand where new threats and vulnerabilities may arise, we should first look at the environments, the businesses and the processes in which information security will find itself. Changes in the environment can have many – and perhaps complex – effects that affect people, processes and technology. Using scenarios, this
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. Printing this content is for the sole use of the Authorised User (named subscriber), as outlined in our terms and conditions - https://www.infopro-insight.com/terms-conditions/insight-subscriptions/
If you would like to purchase additional rights please email info@risk.net
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. Copying this content is for the sole use of the Authorised User (named subscriber), as outlined in our terms and conditions - https://www.infopro-insight.com/terms-conditions/insight-subscriptions/
If you would like to purchase additional rights please email info@risk.net