Digital attack attempts in industrial environments are on the rise. In February 2020, IBM X-Force reported that it had observed…
In Part 1 of the Plights of the Round Table, the executive staff of Camelot was working on the strategic…
Chapter 1 In an ornate boardroom, a group of executives gathered at a large round table for their annual strategic…
Sometimes your best intentions are thwarted by technology. That was the case when Thom Langford and I attempted to do…
With data breaches regularly marking the headlines, it is no surprise that digital threats constitute an increasingly significant concern for…
In October 2018, FICO (a consumer credit scoring specialist) began scoring the cybersecurity of companies based upon a scan of…
Every organization is led by people who are responsible for setting the overall direction, establishing priorities, maintaining influence over organizational…
Recently, I had the privilege to be part of a four-person discussion panel at a security event in London where…
Security and compliance are often said in the same breath as if they are two sides of the same coin,…
The definition of “operational risk” is variable, but it generally covers the risk of loss resulting from inadequate or failed…