Fri, Jun 19, 2020

Alan Brill Discusses Cyber Security Posture During COVID-19 with CIO

Since the emergence of the COVID-19 pandemic there has been a dramatic increase in the number of cyberattacks, as opportunistic bad actors prey on the on the fears and uncertainties of the global population. From hiding malware inside emails to lurking inside video conferencing tools and embedding viruses behind advertisements on social media, cyber criminals have grown alarmingly stealthy as they try to infiltrate computer systems. Some even lay siege to your organization’s most valuable and sensitive data, using ransomware to profit. 

In an interview with the Chief Investment Officer (CIO), Alan Brill, Senior Managing Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps, states that organizations in pursuit of business continuity are not paying adequate attention to their cyber security postures. This fallacy is allowing bad actors to operate under the radar and infiltrate business networks. Alan goes on to further dissect each cyber threat individually and highlights best practices to both safeguard and mitigate against cyber threats. 

The full article is available to subscribers of Chief Investment Officer here

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

Cyber Risk Assessments

Kroll's cyber risk assessments deliver actionable recommendations to improve security, using industry best practices & the best technology available.

Data Protection Officer (DPO) Consultancy Services

Kroll's data privacy team provide DPO consultancy services to help you become and stay compliant with regulatory mandates.

Data Breach Call Center Services

A notification letter can generate lots of questions for those affected by a data breach. Kroll’s call center services are provided by skilled representatives who know how to handle difficult questions and stand at the ready to serve your breached population.

Cyber Policy Review and Design

Ensure that your cyber security policy has the appropriate controls needed to keep your organization's information secure with a remediation plan in place in the event of an incident.