Clearing Europe’s Regulatory Forest: A Swiss Way to Turn TPRM Into a Walk in the Park
TPRM in the context of EU and Swiss laws and regulations. Third party risks as largest identified risks in all implemented NIS-2, ISMS and BCM... Read More
Architectural Resilience: Cybersecurity Strategies for AI-Driven Threats in a Cloud-First Era
Transitioning from static defense to intelligent, self-adapting cybersecurity systems. Integrating Zero Trust principles to enhance security frameworks. Leveraging AI-driven threat intelligence to proactively counter emerging... Read More
Strategic Impacts of Cybersecurity: The Interplay of Digital Transformation and Cybersecurity Management in Organizations
Relationship between DT and Cybersecurity Management: Understanding the tensions between Digital Transformation and Cybersecurity Management. Looking into the three waves of the Fourth Industrial Revolution:... Read More
Social Engineering in the Age of AI – Pitfalls and Effective Risk Mitigating Training
Misconceptions about users increase cybersecurity risks. Poor communication and usability create barriers to secure practices. Overly rigid security measures drive policy violations. Punitive approaches foster... Read More
Balancing Security, Compliance, and Productivity in AI Implementation
Organizations can harness AI’s potential without compromising security and compliance. Organizations need an effective risk management process and a focus on a secure, compliant, and... Read More
Latest Regulatory and Compliance Trends and why that is critical
Regulatory approaches, such as NIS-2 and DORA in the EU, as well as a brief overview of relevant UK and US regulation. Which industries and... Read More
AI’s Achilles’ Heel: Unveiling Vulnerabilities in Artificial Intelligence
How can subtle manipulation of training data introduce hidden vulnerabilities allowing attackers to control AI behavior? How can inputs be crafted to exploit AI weaknesses... Read More