Cyber security invasion is an ever-growing threat and should be a source of daily concern for all organisations. And yet, in spite of widespread publicity of the cost of spectacular attacks, many of the companies are not yet sufficiently prepared across their operations. The responsibility for cyber security is generally delegated to CIOs and CISOs, but ultimately falls on to the boards of directors.
This second edition of Managing Cybersecurity Risk focuses on the human factor training, cautionary tales of breaches that occurred through human error, while also identifying storytelling as an effective tool in cyber education.
In this book, CEO, Brian Lord shares his insight, challenges and advice based on his long experience within the cyber industry. Click the link below to download the full chapter, ‘If SMEs are the life blood of the British economy, we’ve cut an artery‘.
Since 2013, we have been helping organisations of all sizes manage their digital risk. Our team of digital threat experts bring a broad range of experience that will ensure you understand the specific threats to your organisation and how you can mitigate the risk. Talk to us about how we can help you.
How to spot a pseudo-media outlet
Online influence campaigns are becoming increasingly common as political parties and state actors around the world seek to manipulate public opinion.
The three constraints on Influence Operations - Digital Threat Digest
To most people, online influence operations involve competing ideologies battling it out in the public sphere.
The narrative laundromat - Digital Threat Digest
Last week, Russian President Vladimir Putin complained that former Fox News anchor Tucker Carlson had been too soft; saying Carlson avoided “sharp questions” during their interview on 06 February.