Artificial Intelligence (AI) is one of the most powerful and transformative technologies of our time and it also poses significant challenges and risks for safety, security, human rights, and democracy. How can governments regulate AI to protect the public interest and values while fostering trust and innovation? I will briefly compare these two policy initiatives, […]
Cybersecurity experts
Enhancing Resilience: The Role of DORA in Business Continuity and Operational Resilience
In today’s regulatory landscape, navigating various regulations related to risk management can be a daunting challenge for financial institutions. However, the Digital Operational Resilience Act (DORA) offers a unique perspective. DORA not only aligns with existing best practices and regulations but also presents opportunities for financial organizations to elevate their operational resilience. In this article, […]
SolarWinds of Change – How the SEC Ruling Affects the Future of InfoSec Officers
Cybersecurity is more than a technical issue as it has legal and financial implications for companies and investors. The recent U.S. Securities and Exchange Commission (SEC) charges levied against SolarWinds Corporation and its chief information security officer illustrates the serious consequences of failing to disclose and manage cybersecurity risks and incidents in accordance with federal […]
CyAN supports the launch of “BLACK IS ETHICAL”
CyAN is immensely proud to announce its support for ‘BLACK IS ETHICAL,’ the brainchild of one of our board members, Inssata Ricourt. ‘BLACK IS ETHICAL’ is an initiative that unites experts in ethical hacking, some of whom are from the African diaspora or have connections to Africa. They generously share their knowledge and experiences with […]
Streamlining Operations: The Efficiency Gains from Cybersecurity
In the previous parts of our series, “Cybersecurity: The Unsung Hero of Revenue Protection,” we’ve looked at cybersecurity as a strategic business asset, the financial implications of cyber threats, and its crucial role in fostering customer trust. This fourth instalment examines another crucial aspect of cybersecurity—its ability to enhance operational efficiency. As we navigate our […]
New Secure-in-Mind Episodes
We have published a number of new videos/podcasts in our Secure-in-Mind series, featuring a wide range of distinguished and exciting guests. Whether you’re interested in fraud/cybercrime, education, incident response, policy, diversity, cyber risk insurance – the CyAN Secure-in-Mind channel is a great place for informed conversations with experts from around the industry, all over the […]
Balancing Privacy and Security in AI Systems: Navigating the Cybersecurity Conundrum
The rapid advancements in artificial intelligence (AI) have brought about a new era of innovation, and its integration into cybersecurity has opened doors for more robust and efficient defences. However, as AI systems become more sophisticated, the challenges of protecting sensitive data and user privacy have also grown. In this blog post, we will discuss […]
DORA : Les enjeux de la résilience opérationnelle pour le système financier européen
Le Digital Operational Resilience Act («DORA ») fait partie du paquet législatif relatif aux services numérique présenté en 2020 par la Commission de l’Union Européenne (« UE ») et voté fin 2022 par le Parlement. Ce règlement (UE) 2022 /2554 vise à assurer la stabilité et le sain développement du secteur financier à l’heure de […]
Interview with Dr. Cormac Callanan about The US National Cybersecurity Strategy
Dr. Cormac Callanan and John Salomon discuss the US National Cybersecurity Strategy, released by the White House on March 1 2023. In this extensive conversation, they dive into the five pillars of the strategy. What is the US government doing to drive greater cybersecurity maturity? How will the strategy not only impact the United States’ […]
Translation – Fujitsu Breach
The following is a translation by James Briscoe, CyAN Secretary General. The original Japanese announcement by Fujitsu details the results of an investigation by Fujitsu into unauthorised external communications on one of their services. This announcement has not yet made it into the English language. Please find the original Japanese announcement on Fujitsu’s site here. […]