Open in app

Sign In

Write

Sign In

Robin
Robin

20 Followers

Home

About

Sep 12, 2018

DO YOU GIVE THAT PENALTY?

That was the opening remark from Pierluigi Collina in his closing keynote at #GartnerSEC yesterday. ‘It could be worth $150M’ in a Champions League Final. “Decision Making Under Pressure” was the title of his presentation and it was a brilliantly engaging talk. …

Football

3 min read

DO YOU GIVE THAT PENALTY?
DO YOU GIVE THAT PENALTY?
Football

3 min read


Dec 28, 2017

Plan for incident response and information sharing [SWIFT CSP 8/8]

This post is the final part of an eight-part series helping business leaders seeking assurance that their teams have correctly complied with the new controls regime. In this post we are looking with the eighth principle: Plan for Incident Response and Information Sharing. This applies to those with on-premise SWIFT…

Cybersecurity

4 min read

Plan for incident response and information sharing [SWIFT CSP 8/8]
Plan for incident response and information sharing [SWIFT CSP 8/8]
Cybersecurity

4 min read


Dec 27, 2017

Detect anomalous activity to systems or transaction records [SWIFT CSP 7/8]

This post is the seventh part of an eight-part series helping business leaders seeking assurance that their teams have correctly complied with the new controls regime. In this post we are looking at the sixth principle: Detect Anomalous Activity to Systems or Transaction Records. This applies to those with on-premise…

Cybersecurity

4 min read

Detect anomalous activity to systems or transaction records [SWIFT CSP 7/8]
Detect anomalous activity to systems or transaction records [SWIFT CSP 7/8]
Cybersecurity

4 min read


Dec 21, 2017

Manage identities and segregate privileges [SWIFT CSP 6/8]

This post is the sixth part of an eight-part series helping business leaders seeking assurance that their teams have correctly complied with the new controls regime. In this post we are looking at the fifth principle: Manage Identities and Segregate Privileges. This applies to those with on-premise SWIFT implementations and…

Identity Management

4 min read

Manage identities and segregate privileges [SWIFT CSP 6/8]
Manage identities and segregate privileges [SWIFT CSP 6/8]
Identity Management

4 min read


Dec 21, 2017

Preventing credential compromise [SWIFT CSP 5/8]

This post is the fifth part of an eight-part series helping business leaders seeking assurance that their teams have correctly complied with the new controls regime. In this post we are looking at the fourth principle: Prevent Compromise of Credentials. This applies to those with on-premise SWIFT implementations and those…

Cybersecurity

4 min read

Preventing credential compromise [SWIFT CSP 5/8]
Preventing credential compromise [SWIFT CSP 5/8]
Cybersecurity

4 min read


Dec 19, 2017

Physically securing your environment [SWIFT CSP 4/8]

This post is the fourth part of an eight-part series helping business leaders seeking assurance that their teams have correctly complied with the new controls regime. In this post we are looking at the third principle: Physically Secure the Environment. This applies to those with on-premise SWIFT implementations and those…

Cybersecurity

4 min read

Physically securing your environment [SWIFT CSP 4/8]
Physically securing your environment [SWIFT CSP 4/8]
Cybersecurity

4 min read


Nov 6, 2017

Reducing your attack surface and vulnerabilities [SWIFT CSP 3/8]

This post is the third part of an eight-part series helping business leaders seeking assurance that their teams have correctly complied with the new controls regime. In this post we are looking at the second principle: Reduce Attack Surface and Vulnerabilities. This applies to those with on-premise SWIFT implementations and…

Security

4 min read

Reducing your attack surface and vulnerabilities [SWIFT CSP 3/8]
Reducing your attack surface and vulnerabilities [SWIFT CSP 3/8]
Security

4 min read


Oct 12, 2017

Protecting your SWIFT gateway [SWIFT CSP 2/8]

This post is the second in an eight-part series helping business leaders who are seeking assurance that their teams have correctly complied with the new SWIFT Customer Security Programme (CSP) controls regime. In this post we are starting with the first principle: Protecting your Critical Systems from your General IT…

Security

3 min read

Protecting your SWIFT gateway [SWIFT CSP 2/8]
Protecting your SWIFT gateway [SWIFT CSP 2/8]
Security

3 min read


Oct 11, 2017

Do you have confidence your SWIFT security programme has achieved its aims? [SWIFT CSP 1/8]

The high-profile cyber attack that saw hackers attempt to steal nearly $1 billion from Bangladesh’s central bank, is the largest bank heist in history. This demonstrates how sophisticated cyber-criminals are becoming increasingly ambitious in their use of technology to appropriate money undetected, before swiftly moving it around the world. SWIFT…

Swift

2 min read

Do you have confidence your SWIFT security programme has achieved its aims? [SWIFT CSP 1/8]
Do you have confidence your SWIFT security programme has achieved its aims? [SWIFT CSP 1/8]
Swift

2 min read

Robin

Robin

20 Followers
Following
  • Quartz

    Quartz

  • Frank Duff

    Frank Duff

  • Opinionated Security

    Opinionated Security

  • CyLon

    CyLon

  • Mario Platt

    Mario Platt

See all (46)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams