The Insiders: Cybersecurity

April 9, 2018

Anthony J. Ferrante, FTI Consulting’s Global Head of Cybersecurity, recently spoke with Corporate Board Member about how companies can help manage cyber risks by regularly enlisting independent advisors to identify security flaws. His insights are featured on p. 39. The Insiders: Cybersecurity  

Are Dockless Bikes a Cybersecurity Threat?

February 15, 2018

FTI Consulting’s Anthony J. Ferrante discusses the potential security risks associated with dockless bike services based on the financial and mobility data that such services collect in this CityLab article Are Dockless Bikes a Cybersecurity Threat?

Cyberspace Triggers a New Kind of Arms Race

February 1, 2018

FTI Cybersecurity’s Anthony J. Ferrante discusses how the internet is fueling the cyber arms race, allowing malicious cyber actors to deliver weaponized tools at an unprecedented scope and scale in this article featured in Signal Magazine.

A Look Into the Crystal Ball: Cybersecurity Predictions for 2018

December 27, 2017

In this article, FTI’s Head of Cybersecurity comments on cyberspace becoming the new battlefield for modern warfare, the rise in malicious state-sponsored activity, the exploitation of information as a weapon for financial, political and other gain, and urges cybersecurity professionals to be prepared to stay ahead of malicious actors.

China’s Ghost in Europe’s Telecom Machine

December 11, 2017

In this POLITICO EU article which discusses the growing security worries derailing the Chinese tech giant, Huawei’s 5G ambitions, FTI’s Head of Cybersecurity comments on the infrastructure of which data flows, government decisions to use Huawei products, and the risks these governments are willing to take.

Come Fly the Hackable Skies

October 12, 2017

FTI’s Anthony J. Ferrante is featured in this article Come Fly the Hackable Skies on SecurityInfoWatch.com and outlines a number of proactive measures that the aviation industry and organizations at large can adopt to address emerging cybersecurity threats.

The European Union’s Strategy to Face Cyber Threats

December 7, 2017

In this article, FTI’s Alejandro Sánchez discusses the EC’s strategy and its opportunity to improve cybersecurity preparedness, response and recovery throughout the EU to ensure the security of their increasingly digitized society and, therefore, of the digital single market.

Building an Intelligence-Led Cyber Program

December 7, 2017

This webinar covers how to build a proactive program by mapping out the risk landscape and requirements early; how to lead and drive the process, who to involve and what to include; knowing what to prioritize; conducting a vulnerability assessment and identifying your organization’s critical assets; and offers practical tips for making malicious actors’ jobs harder.

Cyber Resilience in 2018: What to Watch

November 27, 2017

In this edition of Cyber Defense Magazine, FTI’s Head of Cybersecurity highlights emerging threats and how organizations should look closely at the top trends expected to hit the cybersecurity landscape in 2018.

Vulnerability Management: A Holistic View

October 30, 2017

In this article, Anthony J. Ferrante discusses some of this year’s biggest cybersecurity incidents and emerging federal policy and legislation around how cybersecurity vulnerabilities are handled through the government’s Vulnerabilities Equities Process (VEP).

Enhancing Cybersecurity with Big Data Analytics

October 2, 2017

Security information and event management (SIEM) systems actively and continuously collect and document security-related events across an organization, providing a security team with alerts about potential threats or vulnerabilities. Such systems are designed to provide a single view across the massive datasets generated daily regarding an organization’s enterprise security, based on parameters defined by an administrator to distinguish between normal and anomalous events.

How Financial Services Companies Can Win the Fight for Cybersecurity

September 28, 2017

The potential financial impact of a global cyber attack today is on par with that of major natural disasters. Financial institutions have historically been targets of cyber criminal actors looking to steal money, client information and proprietary company data. These attacks have typically targeted customers, but alarmingly, since 2016, there has been an increase in campaigns aimed at breaching financial institutions directly.

Cybersecurity Expertise: From the White House to the C-Suite

September 9, 2017

Anthony J. Ferrante, FTI Consulting’s new Head of Cybersecurity addresses the growing cybersecurity threats affecting U.S. businesses today. As the former Director for Cyber Incident Response at the U.S. National Security Council and the former Chief of Staff of the FBI’s Cyber Division, Ferrante has seen cyber risk evolve from a niche focus of intelligence agencies and IT professionals to a true national-level challenge.

Equifax Breach a Category 4 or 5 Attack

September 11, 2017

Recently, we learned that Equifax was breached via a simple web application weakness, and over 143 million consumers’ records were compromised. These records weren’t salacious emails or leaked Game of Thrones episodes; these were the Social Security numbers, home addresses, and the most sensitive financial data of millions of Americans.

Battening Down for the Rising Tide of IoT Risks

August 22, 2017

This article discusses how IoT has evolved over the last two decades and the security risks that have emerged as a result. It will include a discussion of the key problems with IoT development and regulation, and the most pressing challenges security professionals need to consider when developing programs that include IoT security. The article also shares proactive steps organizations can take to establish or strengthen these programs.

Data Breach Prevention and Information Governance Go Hand-In-Hand

October 30, 2016

Information governance (IG) has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data security or storage optimization.