ISITC Europe Supports Innovative Cybersecurity Research
ISITC Europe is backing an innovative research project focused on cybersecurity. This initiative is led by key academics including Dr Desmond Laffey from Kent Business School, Dr Tony Gandy from ISITC Europe, and myself, Professor Daniel Broby from Ulster Business School. By adapting well-established credit rating methodologies used in finance, we intend to create a […]
Cyber Security: Complying with Regulation and Data Law
A Cyber Security Forum Event Cyber Security Executive Briefing: Complying with Regulation and Data Law Date to be confirmed Location: tbc This is the 2nd in a series of face to face briefings for Senior Business leaders, which focuses on complying with regulation and data law. These briefings have been created with the intent to […]
Cyber Security: Defending the Perimeter
A Cyber Security Forum Event Date to be confirmed Location: TBC Cyber Security Executive Briefing: Defending the Perimeter This is the first in a series of face to face briefings for Senior Business leaders. They have been created with the intent to educate, inform, and answer the key Cyber Security questions facing business leaders today. […]
Is Your Home The New Office Webinar Recording
Cybersecurity: Is your home the new office? “Working From Home” exposes the security landscape of your organisation: In this session our experts, Jason Harrell, Executive Director, Technology Risk Management, Head of Business and Government Cybersecurity Partnerships, Aman Sood, Chair, ISITC EUROPE Cybersecurity Forum and Michael Cheshire, CX Transformation EMEA, Verizon Enterprise Solutions talk about how COVID-19 has proven […]
Death By Cyber Attack Webinar Recording
Death by Cyber Attack Webinar The ability of cyber threats to compromise information systems is an ongoing danger to all organisations, however an emerging threat presents a new challenge, cyber-attacks that may cause physical harm to systems with the potential to kill the business. Financial services are among the most attractive targets for cyber attackers […]