The military strategy called “Defense in Depth” can be applied to cybersecurity. It has defenders deployed in a series of pre-planned positions from which they can advantageously attack the advancing enemy.
Digital communication adds additional functionality and control – but also creates new vulnerabilities. It’s impossible to centrally control every connection with employees and clients – therefore a new approach is required.
There’s growing concern within intelligence communities that hostile governments could cyber-invade financial institutions, not to steal money — but to pollute, destroy and manipulate data. One of the biggest exposures lies in the cloud.
Experts say that instead of a cyber attack that deletes or releases stolen data, the next wave of attacks will merely change digital data to compromise its integrity so that, for example, all the tax return data in your systems are no longer correct.
Getting comfortable with your company’s cybersecurity program means being able to answer questions like, “Are we thinking about security the right way, and where is all this going?”
BitSight: You were Chief Risk Officer (CRO) at several major financial institutions. What is the role of the CRO with respect to understanding and overseeing newer, disruptive risks such as cyber?
Excerpt from GARP.org The fast-changing threat landscape requires a data-centric paradigm shift By David X Martin Corporate cultures do not change…
Excerpt from webinar by Hughes Hubbard & Reed law firm, featuring its partner Roel C. Campos and David X Martin. In…
Excerpt from this piece by David X Martin and Roel C. Campos for the law firm of Hughes Hubbard & Reed,…
Excerpt from GARP.org Oversight should be grounded in sound management practices By David X Martin Corporate boards of directors have a…