Time to Accept the Value of a Converged Approach
Among operators of critical infrastructure, risk assessment is being forced to adapt to recognise that cyber security in many ways, is now developing the potential to be a more effective and attractive...
View ArticleCYBER War gaming
The emerging concept in cyber defence is war gaming, which is still in its infancy in the realm of critical infrastructure, and sectors where IT infrastructure is critical or fundamental to an...
View ArticlePenetration Testing is Failing
We are now reaching the point where penetration testing is becoming ineffective, and there is a long list of companies that are struggling to come to terms with the fact their systems &...
View ArticleWhat does your incident response look like?
Every different type of event should elicit a different response. But turn it on its head and ask what your preparation looks like and this is a very different formula, despite the fact that the two...
View ArticleEspionage, The Insider Threat, and why BYOD is Such a Huge Problem
The passive human vector, where staff are either lazy or careless in their adherence to security protocols and individual application of sensible security practices, leads to potentially significant or...
View ArticleReflecting on Cyber Threat Summit 2013
Optimal Risk was proud to sponsor this years CTS 2013. Optimal Risk was proud to sponsor this years Cyber Threat Summit, which is now a virtual global event. We presented on two topics highlighting in...
View ArticleSecurity vs Defence: Time to move on.
an active defence strategy is built on the assumption that effective defence requires a pre-prepared, active plan to deter, ‘counter-act’, or engage threats as part of a specific doctrine.
View Article