FIND US
ABOUT US
A ROADMAP TO
CYBER CONFIDENCE
Challenging Insecurity:
If you have agreed to receive our communications and updates, you can change your preferences or unsubscribe at any time.
By clicking below, you consent to allow S-RM to store and process the personal information submitted above to provide you the content requested.
READ IN FULL:
DOWNLOAD THE REPORT
Please fill in the form to receive a copy of the report:
ARE YOU CONFIDENT IN YOUR COMPANY’S CYBER SECURITY POSTURE?
A FEW SIMPLE QUESTIONS CAN HELP GUIDE YOUR ANSWER
BUILDING CYBER CONFIDENCE: SIMPLICITY, VISIBILITY, AND FAMILIARITY
Leaders make challenging decisions all the time, so why don’t they feel the same level of comfort discussing cyber security?
DO YOU UNDERSTAND THE THREAT PICTURE?
CAN YOU SEE YOUR ADVERSARIES CLEARLY?
HOW TO USE CYBER THREAT INTELLIGENCE TO MAKE GOOD DECISIONS
Before you can reap the value of any threat intelligence, you need to understand what you’re protecting and where the attacks might come from.
WHEN THE VIRTUAL AND PHYSICAL COLLIDE: THE NEED FOR A JOINT APPROACH TO CYBER AND PHYSICAL SECURITY
The 2020 Tesla incident emphasises the importance of a common approach to managing cyber and physical security.
Q&A: CYBER CONFIDENCE & THE LEGAL RISKS ASSOCIATED WITH A CYBER SECURITY INCIDENT
DLA Piper Partner Ross McKean provides guidance on how to prioritise cyber security amid competing strategic imperatives and market forces.
SHOCKWAVES, RIPPLES AND DOMINOES: IDENTIFYING & ADDRESSING SYSTEMIC CYBER RISKS
COVID-19 can help us unpack what kinds of structures are prone to systemic risks. The cybersphere is certainly one of them.
“WHEN IT HITS THE FAN, YOU NEED A PLAN”: GETTING INCIDENT RESPONSE PREPARATION RIGHT
For the moment, the bad guys are winning the arms race in cyber. But the million dollar question is: how should you prepare?
LISTEN TO
OUR PODCAST'S ON THIS SUBJECT:
Q&A: WHAT DRIVES OVER- AND UNDER-CONFIDENCE IN CYBER SECURITY?
An interview with Libby Benet, Global Chief Underwriting Officer, Financial Lines, AXA XL and S-RM’s Senior Managing Director, Billy Gouveia.
DOES YOUR RESPONSE PLAN REFLECT THE MOST LIKELY THREAT SCENARIOS?
DO YOU HAVE A ROADMAP TO RECOVERY IN THE EVENT OF AN INCIDENT?
IN RECOVERY: THE FIRST 24 HOURS OF A RANSOMWARE ATTACK, AND BEYOND
Even the best prepared teams can develop tunnel-vision during a response.
ARE YOU FOCUSING ON THE RIGHT RISKS?
DO YOUR MITIGATION MEASURES ALIGN WITH THOSE RISKS?
Q&A: MITIGATING THE LEGAL RISKS OF A CYBER INCIDENT
In this interview, DLA Piper’s Ross McKean provides additional in-depth insights on how to navigate the cyber security regulatory landscape.