Power Players Cyber Security &Amp; Data Privacy 2022 – Distinguished Advisers — Financier Worldwide – Financier Worldwide

POWER PLAYERS Cyber Security & Data Privacy 2022 – Distinguished Advisers — Financier Worldwide – Financier Worldwide

Follow Us
POWER PLAYERS
September 2022  |  RISK MANAGEMENT
financierworldwide.com
Click cover to download
(Subscriber-only password access)
 
Not a subscriber?
Click here to join the FREE mailing list and receive password access
Threats to cyber security and data privacy continue to grow, both in volume and complexity. Though this trend was already well underway, the outbreak of the coronavirus (COVID-19) pandemic magnified the issue. Today, organisations create more data than ever before, with much of it spread across a wider attack surface, placing it at greater risk.
During the worst of the pandemic, the location of data storage and methods of correspondence had to shift to meet the needs of remote workers. Many of these workers continue to utilise both company and personal devices in the course of their daily activities. With ransomware, business email compromise, phishing and other forms of cyber attack increasing, companies must ensure they have the necessary tools in place to protect themselves, their employees and their data.
In addition to increased attack vectors, companies are also facing higher expectations from regulators, with greater repercussions for companies that suffer data breaches.
Going forward, it is imperative that companies take proactive steps to tackle the threats posed by malicious actors. They must keep up to date with laws applicable to the data they process. They must also give employees the tools and training to help prevent breaches. Appropriate cyber security processes require companies to increase education and awareness among their staff, as well as across their third-party business partners.
Against this backdrop, Financier Worldwide turns to some of the leading lights in their field, who share their stories…
© Financier Worldwide

source


Leave a Comment

Leave a Reply

Your email address will not be published.

Cyber risk assessment: Examples, framework, checklist, and more – Dataconomy

FedRAMP: The Journey to Secure Cloud Operations – MSSP Alert

Personal Data Breach – Notification Requirements Under Qatar Law. Who, When, to Whom and How? – Lexology

DOE Invests $12M in Cybersecurity Research for Energy Grid – Security Intelligence