CYSIAM teams up with Cranfield University - Operational Digital Forensics CYSIAM teams up with Cranfield Defence and Security to deliver Operational Digital Forensics training to global clients Cranfield Defence and Security Services Ltd., a commercial trading entity of Cranfield University, has formed a new partnership with CYSIAM, a specialist cyber security provider. The
About CYSIAM AdminThis author has not yet filled in any details.
So far CYSIAM Admin has created 9 blog entries.
CYSIAM supporting OSCT Accelerated Capability Environment (ACE) CYSIAM is proud to be part of the Vivace (vivace.tech) community, providing expertise and capabilities to the Accelerated Capability Environment (ACE)which is a UK Home Office unit within the Office for Security and Counter Terrorism (OSCT). Contact Us
CYSIAM awarded CREST accreditation CYSIAM is delighted to announce that it has been awarded accredited member status by CREST, the internationally recognised accreditation and certification body. This accreditation covers Penetration Testing and Cyber Incident Response services. CYSIAM is now operating in its second year and has already met many important milestones including last year
Cyber Due Diligence: The New Normal In all likelihood, cyber security capabilities will continue to lag behind both evolving digital technology and the accompanying evolution in exploitation tools and techniques. In addition, network defenders are required to stop every attack whilst hostile states, criminals and activists need only get lucky once. Technology is
Cyber Security in the Supply Chain: You're as Vulnerable as your Weakest Link It’s easy to look at the 2018 British Airways website hack and the resultant c5% fall in the IAG (BA’s parent company) share price, with a certain sense of detachment. It’s a strange phenomenon that this type of headline is
Protect Everything, Harden What's Critical When prioritising cyber security objectives, it’s tempting to identify what you deem to be business-critical and focus your investment of resources in this area. Whilst taking this approach will no doubt improve your resilience, there is a danger of overlooking other key components of your operations. As well
Cyber Risk: For Smart People Who Haven’t Studied Computer Science The torrent of jargon that I.T. people use can be overwhelming. We know because we've experienced first hand, the glazed eye “get me out of this conversation now” look on the faces of non-technical staff across the strata of organisations. This isn’t another
Cyber Security Planning in Private Equity – A Few Points to Consider A full understanding of cyber resilience and an integrated cyber strategy is fast becoming a necessity within a private equity portfolio management approach, rather than a nice-to-have option. An organisation’s equity is so often and so inextricably linked to its data
Waving the Red Flag for Cyber Security Stephanie Stone said it best in Forbes magazine when she declared “Every company is a technology company” (Forbes 2017). As technology now underpins every organisation, every organisation is now vulnerable to a cyber-attack. Taking this statement as a fact in this digital age, then during M&A