Cyber Risk Management: Operations-Based Exercises (Part 3 of 3)
Today’s post concludes our mini-series within a series, as we complete the posts addressing he planning and conduct of exercises as part of our broader ongoing series on applying the Preparedness Cycle to Cyber Risk Management. The complete blog and series can be...
Cyber Risk Management: Conducting Exercises (Part 2 of 3)
Today’s post continues the fifth part of our ongoing series on applying the Preparedness Cycle to Cyber Risk Management. This installment is the second of a three part mini-series within the series, addressing the planning and conduct of exercises. The complete blog...
Improving the National Threat Advisory System
In our 16 May 2017 blog post, we addressed the WannaCry outbreak and how the cyber-incident highlighted the ineffectiveness of the current National Terrorism Advisory System (NTAS). In that, we stated that we’d deliver a follow-up post to suggest one way that the...
Cyber Risk Management: Conducting Exercises (Part 1 of 3)
Today's post begins the fifth part of our ongoing series on applying the Preparedness Cycle to Cyber Risk Management. This installment is the start of a three part mini-series within the series, addressing the planning and conduct of exercises. The complete blog and...
Webinar: Gate 15 & SurfWatch Labs on “Analyzing the Human Element in Evolving Cyber Threats”
On 27 July, Gate 15's Kristi Horton and SurfWatch Labs' Adam Meyer addressed: Recent extortion and ransomware attacks against entertainment and media organizations by TheDarkOverlord Analysis of technical, socio-behavioral and geopolitical circumstances that threaten...
Cyber Risk Management: Awareness and Operational Training
This is the fourth in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness Cycle to Cyber Risk Management (read parts one, two, and three here). In our sustained effort to reduce risk through proper preparedness, we’ll tackle the...