Hacking as a Service, best known as HaaS, has become one of the most used modalities among hackers who are seeking to make their criminal activities much more lucrative. By selling their hacking skills, as well as easy-access tools, instructions, target lists, and...
On Wednesday, March 16th, Olga Botero, our Founding Partner, and Juanita Duque, our VP of Cybersecurity, were invited to give a conference in the II Jornada STIC Colombian Chapter on how to manage a #cybercrisis!
During their presentation, titled “How to Prevent Crisis Management from Becoming a Crisis?”, Olga and Juanita illustrated how to manage a cybersecurity crisis, from its advance planning to its closure. Attendants learned how to identify a cybersecurity crisis situation, the importance of defining internal and external roles during a crisis and defining who should participate and how.
Special emphasis was made on the roles of Senior Management, Board of Directors, internal teams related to the legal, communications and technical areas, and external actors (including the roles of providers, regulators, specialists, insurers, and experts needed during a crisis).
The conference also made emphasis on critical activities such as communication, the management of all those involved (customers, suppliers, collaborators, shareholders, media, etc.), legal and financial activities and the technical crisis management cycle.
Moreover, experiences from real-world cases were exposed, including learnings of what they did well and what they did wrong, such as the 2010 Deepwater Horizon oil spill.
Thank you CCN-CERT for allowing us to be part of this year’s event!
I am very proud to have the privilege of attending and participating in the NACD’s Global Cyber Forum. I really enjoyed the opportunity to speak about how to think about security at the technological frontier with my esteemed...
What is cyber security? We all hear this term in the news, at work, and even on television. Many topics come to mind when we hear the term cyber security: “firewalls”, “virus”, “passwords”, “technology protection”, and even “email fraud”. But, have we truly answered...