DORA compliance: a roadmap for financial institutions (Part 2)
In the previous blog, we discussed the urgency of Digital Operational Resilience Act (DORA) compliance, the common challenges organisations face, and how ITC’s unique capabilities and integrated delivery model make us a trusted partner in achieving cyber resilience. In this second part, we will delve into the specific steps organisations can take to navigate the […]
DORA compliance: navigating the path to cyber resilience (Part 1)
The Digital Operational Resilience Act (DORA) is set to revolutionise the way financial institutions approach cyber security and risk management. As the threat landscape continues to evolve, with increasingly sophisticated attacks targeting the financial sector, DORA provides a comprehensive framework to bolster operational resilience and protect against ICT disruptions. While the official implementation date is […]
Outrunning cyber threats: Insights from Microsoft’s cyber security expert
In the relentless realm of cyber security, the need for practical insights and actionable strategies to thwart cyber threats has reached unprecedented heights. Wendy Carstairs, Microsoft’s Cloud Solutions Leader, recently illuminated the path forward during her insightful presentation at the ITC Cyber Peak. In this blog post, Wendy delves into key takeaways, emerging trends, and […]
Reframe the conversation
Lieutenant General Sir Graeme Lamb is a former director of UK Special Forces and Commander of the British Field Army. Sir Graeme is the Chairman of ITC Secure Cyber Advisory Council. In this blog, Sir Graeme sets the context from a geo-political perspective and urges businesses to take stock of ground realities as they build […]
10 cyber security trends in 2023
Cyber security isn’t easy. As malicious actors continue to evolve with the times, security protocols and strategies are more critical than ever. The past year has seen a significant number of organisations fall victim to cyber attacks, from Uber and Cisco through to Twilio demonstrating that no business is immune from these insidious threats. As […]
Bridging the gender gap in cyber security
ITC Secure’s Chief Operating Officer, Fleur Chapman, explores why gender diversity is so important for the future of cyber security and how the industry can make progress in becoming more inclusive for women. Cyber security is one of the most sought-after technology skills today, with 59% of organisations indicating that they would find it challenging […]
To survive in the age of advanced cyber threats, leadership and collaboration are key
In this blog, Admiral Mike Mullen, Chairman of the Board for ITC US and Former Chairman of the US Joint Chiefs of Staff for Presidents Bush and Obama, looks #BEYOND the now in cyber security, at the importance of leadership and the need for collaboration to tackle the speed of change. When I was in uniform, […]
Ten trends shaping the 2022 cyber security landscape
The world is changing in fundamental ways, leading to dramatic shifts in the landscape of risks faced by businesses, where change is the only constant. As the new normal of hybrid work takes shape, organisations around the world are facing a surge of sophisticated cyber threats and increased complexities for security teams. In this new […]
How to Stay One Step Ahead of Ransomware in 2022
In his previous blog, ITC’s Cyber Advisor, Neil Lappage, discussed how the capabilities of ransomware actors and the complexity of attacks are evolving faster than an organisation’s ability to prevent them. Ransomware continues to be amongst the fastest-growing cyber attack strategies faced by businesses today. Bad actors are also making attacks more complex, costly, challenging […]
The Evolving Threat of Ransomware
Ransomware surged during the COVID-19 pandemic to become one of the biggest threats facing businesses. This was echoed by the World Economic Forum’s recent risk survey that reported cyber security as second to climate change as factors that will shape the next decade, with the pandemic coming third place. Although the shift to remote and […]