Recent Posts

Moving from awareness to establishing a cybersecurity culture : the under used potential of managers

Moving from awareness to establishing a cybersecurity culture : the under used potential of managers

CyAN member Delphine Chevallier discusses the need to do more to involve management closely in the development of cybersecurity maturity in organizations.

Stay Ahead of the Game: Outsmarting Scammers in 3 Simple Steps

Our friends at the Global Anti-Scam Alliance (GASA.org) provide a high level overview of current scam trends and techniques, and how to protect yourself.

The Imperative of Unified Cybersecurity in a Digitalised World

In our previous discussions, we delved into the multifaceted role of cybersecurity as a strategic business asset. We highlighted its pivotal role in safeguarding revenue, fortifying customer trust, and enhancing operational efficiency. In this discourse, we will dissect why unified cybersecurity has become more crucial 

Regulatory Compliance: Sidestepping Penalties through Robust Cybersecurity

In our ongoing series, “Cybersecurity: The Unsung Hero of Revenue Protection,” we’ve explored how cybersecurity acts as a strategic business asset, protects revenue, builds customer trust, and enhances operational efficiency. In this final instalment, we turn our attention to the role of cybersecurity in ensuring 

Streamlining Operations: The Efficiency Gains from Cybersecurity

In the previous parts of our series, “Cybersecurity: The Unsung Hero of Revenue Protection,” we’ve looked at cybersecurity as a strategic business asset, the financial implications of cyber threats, and its crucial role in fostering customer trust. This fourth instalment examines another crucial aspect of 

From Data Protection to Trust Elevation: The Role of Cybersecurity

In the initial instalments of our series “Cybersecurity: The Unsung Hero of Revenue Protection,” we highlighted the pivotal role cybersecurity plays as a strategic business asset and underscored the significant financial implications of cyber threats. This third part brings into focus a crucial factor in 

New Secure-in-Mind Episodes

We have published a number of new videos/podcasts in our Secure-in-Mind series, featuring a wide range of distinguished and exciting guests. Whether you’re interested in fraud/cybercrime, education, incident response, policy, diversity, cyber risk insurance – the CyAN Secure-in-Mind channel is a great place for informed 

Understanding the Cost of Cyber Threats

In an ever-evolving digital landscape, the rise of cyber threats has made cybersecurity a top priority for businesses worldwide. Historically, cybersecurity has been seen as a shield—a defensive mechanism to ward off attackers and protect our sensitive data. However, in this increasingly interconnected world, it’s 

Cybersecurity: The Unsung Hero of Revenue Protection

Part 1: Reframing Cybersecurity: From Defence to Business Strategy In an ever-evolving digital landscape, the rise of cyber threats has made cybersecurity a top priority for businesses worldwide. Historically, cybersecurity has been seen as a shield—a defensive mechanism to ward off attackers and protect our 

Embracing AI for Enhanced GRC Strategy and Implementation

The intersection of governance, risk, and compliance (GRC) is a critical aspect of an organisation’s strategy to protect its digital assets, maintain its reputation, and navigate complex regulatory landscapes. As technology continues to evolve, artificial intelligence (AI) is emerging as a powerful tool that can