Managing Third-Party Risk in 2021
It is always in a company’s best interest to protect itself from vendor risks – before entering, during, and even after the vendor relationship has been established.
It is always in a company’s best interest to protect itself from vendor risks – before entering, during, and even after the vendor relationship has been established.
At the conclusion of the assessment, Privasec will provide a set of recommendations on how to address any identified gaps against APRA CPS 234.
“ARN congratulates Team Privasec on becoming a finalist in the Diversity& Inclusion Champion 2021 category,” said Cherry Yumul, vice president of Strategic Partnerships and Innovation at IDG. “We applaud your standout contribution in helping to set an industry benchmark for female achievement across Australia.
Adopting the NIS Directive formulated by the European Union appears to be an excellent decision by Australia to elevate the security level of critical infrastructure networks and information systems.
Are we really safe and secure when working from home amid the Covid-19 pandemic? Check out the cyber security insights shared by Quan Heng.
Australian Cyber Security Centre’s (ACSC) Strategy to Mitigate Cyber Security Incidents provides a prioritised list of mitigation strategies to assist organisations in protecting their systems and their crown jewels against a range of adversaries. The mitigation strategies advised by ACSC vary and can be customised based on the risk profile, the industry sector and the adversaries the organisation is most concerned with.
Makinson d’Apice has long been part of Australia’s business fabric. Check out the testimonial left by Asitha Udumalagala, Head of Information Technology at Makdap.
Australian Cyber Security Centre’s (ACSC) Strategy to Mitigate Cyber Security Incidents provides a prioritised list of mitigation strategies to assist organisations in protecting their systems and their crown jewels against a range of adversaries. The mitigation strategies advised by ACSC vary and can be customised based on the risk profile, the industry sector and the adversaries the organisation is most concerned with.
The Council of Financial Regulators (CFR) released a framework in December 2020 that
is used to build red team scenarios to test the level of Australian financial services industry’s cyber resilience.
The Cyber Operational Resilience Intelligence-led Exercises (CORIE) framework is a pilot programme of exercises that will mimic the Tactics, Techniques and Procedures (TTPs) of real-life adversaries, creating and utilising tools, and using techniques that may not have been anticipated and planned for. Read more to understand how the CORIE framework could help Financial Institutions (FI) stay competitive and secure by leveraging an unbiased view, and by third-party providers mimicking real-world Advanced Persistent Threats (APTs).
In a world full of costly data breaches and invasive privacy incidents, Singapore is not immune. It’s not just the big threats such as cyber criminals, nation-state hackers and cyber espionage—even simple employee mistakes can end up exposing private data and costing your organisation millions.
To combat the growing wave of privacy and cybersecurity issues, Singapore passed the Personal Data Protection Act (PDPA) 2012. These regulations are complemented by the Data Protection Trustmark (DPTM), a voluntary certification that helps organisations demonstrate that they have appropriate protection and privacy practices in place to guard their personal data.