FIND US

ABOUT US

A ROADMAP TO 
CYBER CONFIDENCE

SIGN UP TO RECEIVE OUR NEWS & INSIGHTS

Challenging Insecurity:

DOWNLOAD THE REPORT

S-RM's Privacy Policy

If you have agreed to receive our communications and updates, you can change your preferences or unsubscribe at any time.  

By clicking below, you consent to allow S-RM to store and process the personal information submitted above to provide you the content requested. 

READ IN FULL: 
DOWNLOAD THE REPORT

Please fill in the form to receive a copy of the report:

Cyber Confidence
READ MORE INSIGHTS

ARE YOU CONFIDENT IN YOUR COMPANY’S CYBER SECURITY POSTURE? 
A FEW SIMPLE QUESTIONS CAN HELP GUIDE YOUR ANSWER

BUILDING CYBER CONFIDENCE: SIMPLICITY, VISIBILITY, AND FAMILIARITY 

Leaders make challenging decisions all the time, so why don’t they feel the same level of comfort discussing cyber security?

READ MORE
Cyber Intelligence

DO YOU UNDERSTAND THE THREAT PICTURE? 
CAN YOU SEE YOUR ADVERSARIES CLEARLY?

Incident Response Planning

HOW TO USE CYBER THREAT INTELLIGENCE TO MAKE GOOD DECISIONS 

Before you can reap the value of any threat intelligence, you need to understand what you’re protecting and where the attacks might come from.

READ MORE
Cyber Risk Mitigation

WHEN THE VIRTUAL AND PHYSICAL COLLIDE: THE NEED FOR A JOINT APPROACH TO CYBER AND PHYSICAL SECURITY 

The 2020 Tesla incident emphasises the importance of a common approach to managing cyber and physical security.

READ MORE

Q&A: CYBER CONFIDENCE & THE LEGAL RISKS ASSOCIATED WITH A CYBER SECURITY INCIDENT 

DLA Piper Partner Ross McKean provides guidance on how to prioritise cyber security amid competing strategic imperatives and market forces.

READ MORE

SHOCKWAVES, RIPPLES AND DOMINOES: IDENTIFYING & ADDRESSING SYSTEMIC CYBER RISKS 

COVID-19 can help us unpack what kinds of structures are prone to systemic risks. The cybersphere is certainly one of them.

READ MORE

“WHEN IT HITS THE FAN, YOU NEED A PLAN”: GETTING INCIDENT RESPONSE PREPARATION RIGHT 

For the moment, the bad guys are winning the arms race in cyber. But the million dollar question is: how should you prepare?

READ MORE
Cyber Incident Response Services

LISTEN TO 
OUR PODCAST'S ON THIS SUBJECT:

Q&A: WHAT DRIVES OVER- AND UNDER-CONFIDENCE IN CYBER SECURITY? 

An interview with Libby Benet, Global Chief Underwriting Officer, Financial Lines, AXA XL and S-RM’s Senior Managing Director, Billy Gouveia.

LISTEN HERE

DOES YOUR RESPONSE PLAN REFLECT THE MOST LIKELY THREAT SCENARIOS? 
DO YOU HAVE A ROADMAP TO RECOVERY IN THE EVENT OF AN INCIDENT?

IN RECOVERY: THE FIRST 24 HOURS OF A RANSOMWARE ATTACK, AND BEYOND 

Even the best prepared teams can develop tunnel-vision during a response.

READ MORE
Cyber Defences

ARE YOU FOCUSING ON THE RIGHT RISKS? 
DO YOUR MITIGATION MEASURES ALIGN WITH THOSE RISKS?

Q&A: MITIGATING THE LEGAL RISKS OF A CYBER INCIDENT 

In this interview, DLA Piper’s Ross McKean provides additional in-depth insights on how to navigate the cyber security regulatory landscape.

LISTEN HERE