Interos

Protecting FSIs as risk management stakes grow

This whitepaper provides valuable insights on protecting financial institutions from growing risk management stakes, including the impact of new guidelines and the emergence of fintech relationships.
Whitepaper Financial Management Cyber Risk Management
Pure Storage

Strengthening Operational Resilience in Financial Services

"Operational disruptions can cause wide-reaching harm to consumers and pose a risk to market integrity, threaten the viability of firms, and cause instability in the financial system."- Financial Conduct Authority True resilience encompasses the entire ecosystem, with a focus on the data and technology that underpins modern business. This recently published white paper breaks down the key components of operational and cyber resilience regulations and the best practices for addressing them. - Changing Scope and Cost of Risk Management - Focus on Critical Infrastructure and Services - Cyber Security Front and Center
Ebook Cyber Risk Management
HPE

Using zero trust to build secure architectures for an edge-to-cloud world

As the theft of digital information has become a pervasive global threat, cybersecurity has moved to center stage. With the right mix of integrated security design and constant monitoring of your users,devices, systems, apps, and data, you can improve your security posture and prevent cyberattacks before they impact your organization By embracing a data-driven and zero-trust approach holistically across your organization, you canmake a cultural shift to prioritize cybersecurity as a critical factor in your data-first modernization efforts. In this paper, HPE defines “zero trust” and explains how it can empower organizations with:
Blog Cyber Risk Management Cyber Security
Archer

How pioneering integrated tools are helping companies to manage unforeseen operational risks

A war on the European Union’s borders, a cost of living crisis, global energy security challenges and bottlenecks in supply chains are just some of the hurdles that the world’s leading financial institutions must negotiate in a post-pandemic world. But there are also other hidden threats that must be identified, assessed and mitigated. 
Article Cyber Risk Management
Aon

Targeting the top: how cybercriminals are getting personal

From exploiting digital footprints to weaponising advanced AI, online fraudsters are expanding their toolkit. Is it time for senior executives to watch their step? Although the C-suite can be a tough nut to crack, the potential payouts from a successful whaling attack – one that targets top-level executives - can make cracking it well worth a fraudster’s time.
Article Cyber Risk Management Cyber Security Cyber Threats