Cyber Trends

- Darren Thomson
Coronavirus & IT Risk - Is the Pandemic Creating New IT Norms?
How could the pandemic change the way that we use technology in the long term?
Read Article

- Darren Thomson
The Coronavirus & IT Risk - Our Reliance on the Cloud
The increased use of cloud services as a result of the pandemic generates new trends and risks that are emerging and that should be considered.
Read Article

- Darren Thomson
What Do Pandemics Do to IT Risk - Impacts of Home Working
What are the likely effects, both short and long-term that the Coronavirus pandemic will likely have on businesses in the coming months through the lens of cyber risk?
Read Article

- Yvette Essen
Tackling the cyber data dilemma
There is much debate about how the insurance industry can benefit from the explosion of data - a topic that was once again raised in a recent The Times Raconteur supplement, looking at the future of insurance.
Read Article

- Charlotte Anderson
ECB Fears Over Financial Liquidity Cyber Risk a Prescient Warning
Operational outages that encrypt or destroy balance accounts at a major bank could cause a liquidity crisis.
Read Article

- Darren Thomson
Industrial Control Systems & Connections to the Wild Internet – It Appears That Lessons Are Not Being Learned
News broke this week of a ransomware attack bringing an unnamed US gas pipeline facility to its knees.
Read Article

- Laurel Di Silvestro
Silent Cyber and the Role of Data in Modeling
Silent cyber exposure is now up front and center in every discussion topic for non-property lines of business, and increasingly for property as well
Read Article

- Pascal Millaire
Davos: 6 takeaways and 1 overarching theme
Pascal Millaire shares his 6 takeaways from the World Economic Forum's 2020 Davos Conference.
Read Article

- Pascal Millaire
Cybersecurity at Davos: Is there anything we can agree on?
Reaching alignment within a country and industry on cyber issues is a tough task, made harder when you broaden the stakeholders as the WEF aspires to do.
Read Article

- Alejandro Sauter
Data Theft: Passing Trend or Permanent Add to Ransomware?
This year we observed the bear’s share of the ransomware market consisting of 2 main approaches: the ransomware-as-a-service (RaaS) & the big game hunting
Read Article

- Ashwin Kashyap
Models must evolve to tackle silent cyber
Insurers are finding themselves squeezed between regulators and reinsurers who both want the issue of so-called ‘silent cyber’ risk to be tackled.
Read Article

- Yvette Essen
Dashing straight for “shiny new” security tools compounds cyber breach challenges
A rush to take on a variety of new security products can act as a distraction from preparing for a cyber breach.
Read Article