Welcome to Cybersecurity Awareness Month

We view cybersecurity as a global issue.

Anthony J. Ferrante, Cheryl Davis, and the rest of the FTI Cybersecurity team will be all over the globe this month helping educate boards, executives and advisors about the importance of cybersecurity in protecting organizations, people and assets.

Over the course of October, we will look at different approaches for combating global cybersecurity threats affecting business operations and corporate reputations. We will have a different focus each week, so stay tuned.

 

October 6 | IA Watch’s Cybersecurity for Financial Services Conference | Washington, DC

October 15-18 | 2017 ACC Annual Meeting | Washington, DC

October 18-20 | Various Cybersecurity Events | Brussels

October 24 | FTI Cybersecurity Rooftop Party | Washington, DC

October 26 | ACC (CLE) Warriors Basketball Event | San Francisco, CA

October 26 | Private Financial Services Dinner | New York, NY

 

  • Week 3 | October 15-21 | Emerging Cyber Threats

    • -Our focus this week is “Emerging Cyber Threats.” The cyber threat landscape is becoming progressively broader and increasingly treacherous. As we connect more and more of our infrastructure to the Internet and build out the Internet of Things (“IoT”) our ecosystem is relying heavily on automation and machine learning. This has resulted in more entry points for attackers and wide-ranging threats from IoT botnet attacks to ransomware and sophisticated phishing campaigns, among other threats.  Learn More >

    • -An intelligence-led, strategic cybersecurity program should be prepared to protect organizations from emerging cyber threats. The ability to  identify, implement, and manage defensive best-practice processes including access control, awareness and training, data protection policies, network maintenance, and deployment of protective technologies is crucial to mitigating risk and protecting enterprise value in the face of the ever-evolving cyber threat landscape.  Learn More>

  • Week 2 | October 8-14 | Cybersecurity Governance

    • -Our focus this week is “Cybersecurity Governance.”  The threats to organizations are growing due to the increasing reliance of business activity on global internet connectivity as well as the commercialization and professionalization of cybercrime.  This potent combination is driving the increased frequency and severity of cyber incidents.  Accordingly, many regulations have been enacted and many agencies and industries are in the process of drawing up their own cybersecurity regulations — NY cybersecurity regulation DFS Part 500 which became effective in March 2017, and General Data Protection Regulation (GDPR) in Europe set to be effective in May 2018.  Learn More>

    • -A compliant, holistic cybersecurity program founded upon a comprehensive understanding of cybersecurity risk should be an integral part of an organization’s enterprise risk-management strategy.  The process of thoroughly examining existing procedures and policies and developing more secure ones can enable a firm to learn about and incorporate up-to-date best practices and operational controls, not only in security but also in organizational governance.  Learn More>

  • Week 1 | October 1-7 | Incident Response

    • -Our focus this week is “Incident Response” and how to respond, investigate and recover from cyber breaches. Every organization faces security threats that can compromise personal and business data. Cyberattacks and other critical security incidents can stand in the way of your ability to keep your business functioning. A quick and effective response is critical to mitigate long-term damage. FTI Consulting has the expertise to assist when a company encounters a cyber incident and ensure the response plan is seamlessly integrated throughout its critical functions.  Learn More>

    • -Cybersecurity threats can lead to incidents — such threats can originate from both external and internal sources. There are seven “Continuing Threats” to corporate operations and reputation: 1) Theft of Communications; 2) Destructive Malware; 3) Ransomware; 4) Distributed Denial of Service (DDoS) Attacks; 5) The Internet of Things; 6) Social Engineering and Human Error; and 7) Nation-State Actors.  Learn More>