EVENT
 
At this event, we will show you how to get the most value out of your network monitoring and endpoint protection tools to achieve the quickest possible response time.
EVENT
 
This half-day table-top exercise will walk you through a cyber crisis with an interactive simulation, giving you an opportunity to make some of the decisions that you may face during a cyber crisis. You will face difficult choices and time pressure, where the stakes and the risk of making a costly (...)
OPINIONS
 
Insider threats have always existed, but accessibility and the value increase of data have made it easier and more attractive to commit fraud for those who have a swinging moral compass. Philippe Roy has some advice on how to address insider fraud.
OPINIONS
 
Is the cyber security threat landscape based on fact or fiction? It’s just one question we posed to our own security experts Tim Anderson and Graham McElroy as we chatted to them to find out more about their thoughts on how organisations can reduce their cyber risk.
EVENT
 
At this event, we will take you on a voyage through the current threat landscape for the financial sector and show you how clients are defrauded on desktop and mobile platforms.
OPINIONS
 
How do you prepare your organisation most effectively against cyber-attacks and how do you balance the ROI at the same time? The short answer is: Create a plan and practice it!
THREATS
 
Our researchers, Mario Rivas and Daniel Romero, discovered remote vulnerabilities in all of the printers they tested through various attack vectors, uncovering a large number of zero-day vulnerabilities in the process.
OPINIONS
 
Financial institutions in Denmark are regulated by TIBER-DK, which is a Red Team test framework, established with the aim of strengthening cyber security in the sector. A TIBER test is a long and resource-consuming process that requires months of preparation and planning for even the most security- (...)
OPINIONS
 
Considering security holistically in the development of Application Programming Interfaces (APIs), will protect customer data in Open Banking and make the task less complex. Creating the future’s innovative bank is about embracing the possibilities of Open Banking instead of its limitations.
EVENT
 
This session will walk you through a cyber crisis with an interactive simulation, giving you an opportunity to make some of the decisions that you may face during a cyber crisis. You will face difficult choices and time pressure, where the stakes and the risk of making a costly mistake are high - (...)
OPINIONS
 
The basis for mandating financial institutions to carry out a TIBER test, is to ensure that an entire nation does not come to a standstill if one of its largest banks suffers a severe cyber attack. As this is the logic behind the initiative, then why shouldn’t other critical sectors be inspired by (...)
OPINIONS
 
When you are responsible for managing your information security, ideally you would want to cover every possible angle. But a number of factors, such as financial resources, time and competencies, force you to prioritise. If prioritising is a challenge, a good exercise is to simulate a constraint. (...)
OPINIONS
 
Director of Risk Management & Governance in FortConsult, Peter Brahe talks about what he is looking for when hiring new IT security consultants, how talent is developed in FortConsult, and the requirements that he sets for his consultants.
WAR STORIES
 
Read about how our Black Team succeeded in a physical breach of a seemingly secure organisation with good physical security controls, with the help of a somewhat forgetful security guard.
EVENT
 
FortConsult invites you to a free event, where we will show you how to measure and improve your security posture.