article thumbnail

Cyberrisk Management Tips for Businesses Amid the Russia-Ukraine War

Risk Management Monitor

Attacks attributed to Russia have been launched against a range of targets in Ukraine, including new destructive malware campaigns , targeted information-gathering against a range of civilian and government targets, and attacks on critical infrastructure. Evaluate and if possible, test your business continuity plans.

article thumbnail

Artificial Intelligence in Cybersecurity: Hype vs. Reality

FS-ISAC

In the race of financial institutions to digitise products and services, ING believes that applying new technologies enables us to further foster our cybersecurity capabilities, so we can continue to bring business value and improve risk management for the bank.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A BC Consultant’s View of the Risks of Generative AI

MHA Consulting

In today’s blog, we’ll look at those risks from the point of view of a business consultant who specializes in technology and IT disaster recovery. A parallel potential exists in other activities that rely on AI, whether it’s analyzing x-rays, performing air traffic control, or scanning for bank fraud.

article thumbnail

Phil Venables: AI in Cybersecurity - Threats, Toil, and Talent

FS-ISAC

This may not become “the” framework, as there are others like the NIST AI Risk Management Framework. Threats: Google is using LLMs, AI and GenAI to analyze, monitor and manage threats, like analyzing new malware discovered via Google’s VirusTotal service and using Sec-PaLM 2 LLM to decode and provide threat advice.

article thumbnail

From Emerging Trends to Cyber Risks: a Latin American Perspective

FS-ISAC

As part of our Latin America focus for this edition of FS-ISAC Insights, we spoke with Homero Valiatti, Superintendent of Information Security at Itaú, Brazil's largest bank and the largest financial institution in the southern hemisphere. How are you managing the uptick in attacks on the supply chain?

article thumbnail

Data Privacy Week 2024: The Definitive Roundup of Expert Quotes

Solutions Review

And when a phishing attack succeeds, the cybercriminals capture private data, personal information, company data, or they may even install malware directly onto the device to facilitate ongoing attacks. Federal laws are a patchwork, focused on specific verticals such as banking or healthcare. At present, this is having varied results.

article thumbnail

Data Privacy Awareness Month 2024: Roundup of Expert Quotes

Solutions Review

And when a phishing attack succeeds, the cybercriminals capture private data, personal information, company data, or they may even install malware directly onto the device to facilitate ongoing attacks. Federal laws are a patchwork, focused on specific verticals such as banking or healthcare. At present, this is having varied results.