Program management
-

Top Cyber Risks for Family Offices
Any given organization or firm takes on cyber risk when dealing with assets and private information in a digital space. Cyber risks for family offices, in particular, have been heightened as they have become targets by the rising threat of ransomware. Among a multitude of other potential breaches and malicious parties seeking to take advantage of…
-

IDG Connect: Secret CSO: Simon Eyre, Drawbridge
Drawbridge CISO Simon Eyre explores how the corporate world has started to understand that cyber is not just IT’s problem; it’s everyone’s problem. Read more at IDG Connect.
-

Pentagon Cybersecurity Continues to Push for Stronger Capabilities
As worldwide cybersecurity procedures come into question, numerous reports about the Pentagon Cybersecurity efforts to push for stronger capabilities, throughout the United States as well as for its allies. In light of heavily publicized cyber-attacks that have plagued national security interests and private industry in recent years. This push for the strengthening of cyber procedures…
-

The U.S. Partners with Other Governments to Combat Ransomware
On November 14, the U.S. Treasury Department announced a partnership with Israel in an effort to strengthen cybersecurity protocols in the fight against ransomware. This joint effort will see the creation of a task force meant to defend from cybercriminals and attacks from foreign nations. Ransomware attacks have been increasing as technologies and malware that…
-

Service Spotlight: The Necessity of Cyber Risk Assessment
In order to defend your firm from growing threats and elevate your risk posture, there need to be continuous efforts to analyze and defend from said threats. Pre-existing cybersecurity programs need to not only be made to fit within regulations, but should be poised to mitigate any potential threats lurking in an online space. With…
-

How Real Estate Investors can Benefit From Cybersecurity
Real estate investors and operators are quickly coming to learn the need of cybersecurity. With digital transformation only accelerating in the era of Covid, more and more assets and private information are being safeguarded online. At the same time, cyber threats have been increasing at a monumental rate, necessitating adjustments and investments across all industries…
-

Service Spotlight: Cybersecurity Readiness
Cybersecurity readiness allows your firm to properly respond to cyber threats and online malicious parties. Typically, by following regulatory procedures and shoring-up your cybersecurity policies, online threats can be mitigated throughout your firm. Firms may struggle to achieve cybersecurity readiness for a variety of reasons, but with the right team behind your cybersecurity programs, cybersecurity…
-

Traders Magazine: Outlook 2022: Simon Eyre, Drawbridge
Drawbridge CISO Simon Eyre shares cybersecurity insights from 2021 and predictions heading into 2022.
-

Cybersecurity News: The Importance of The White House’s International Meeting on Ransomware
Recently, efforts by the United States Government to fight back against ransomware have been in full swing. To better combat these growing threats, The White House has met with representatives from numerous nations in order to focus on the threat of ransomware and other cyberattacks that have been plaguing industries both private and federal. This…
-

Cybersecurity News: What the TSAs New Railway Cybersecurity Mandates Mean
As looming cybersecurity threats continue throughout the nation, the need for federal bodies and private industries to heighten cybersecurity regulations has never been greater. In preparing certain sectors for potential breaches, the federal government hopes that they can be more prepared and efficient in dealing with cyber-attacks. Recently, the Transportation Security Administration (TSA) has imposed…
-

Service Spotlight: Cybersecurity’s Role in Business Continuity
A Business Continuity Plan or BCP brings a great deal of security to your firm. Both personnel and assets can be better protected with a continuity plan in place. BCP’s allow for your firm to function throughout emergency situations. Drawbridge considers a BCP to be more important than ever in a growing threat landscape. A…
-

Cybersecurity News: How to Avoid Phishing Attacks
Phishing attacks are a popular method of cyber-attack typically used by malicious parties who seek to gain personal information. Usually, a malicious party will employ phishing for the sake of gaining account credentials of any kind, be it an email address or passwords for company websites. Successful phishing attempts have led to complete network access…
