Resilience | September 10, 2018
Adapting changes:City ResilienceThe world is at the mid of climate change, that building resilience for each city have become necessity of the hour. City Resilience is a vast topic that is structured […]
Our learning path towards Resilience – Controls, Auditing, Organizational Resilience & IT Resilience
Resilience | September 10, 2018
Adapting changes:City ResilienceThe world is at the mid of climate change, that building resilience for each city have become necessity of the hour. City Resilience is a vast topic that is structured […]
Cyber Resilience | September 1, 2018
Cyber Insurance as a step towards Cyber ResilienceWhile thinking about Cyber Resilience from Cyber Security, the very first change in thought process is we accept the fact that our security mechanisms / defense strategies will fail, in […]
Business Continuity | July 18, 2018
Peer Collaboration to effectively Manage Third Party RisksBackground The threat landscape is increasing everyday, and so are the need to comply with the changing regulations, and all this in alignment with corporate goals. When we consider third-party […]
Cyber Security | July 18, 2018
Dealing the Risk with Smart ThingsDuring this period of digital transformations TPRM is the buzz word for most of the corporate services. When TPRM deals with analyzing and controlling risks attached to the operations, data […]
Case Analysis | July 9, 2018
Case: PNB $1.77 Billion fraud via SWIFT systemBackground SWIFT & CBS SWIFT is a messaging system used by banks / lenders around the globe to transfer foreign money between them. The banks have Core Banking System (CBS) […]
Basics | July 8, 2018
Differentiating Incident & Problem ManagementIncident is a negative event or an event with negative outcomes. In general, Incident, Problem, are terms which are used interchangeably and in some places, to top up the confusion, […]
Business Continuity | July 5, 2018
Leveraging Third Party Risk AssessmentA risk develops when there is a threat exploiting the vulnerability. Nowadays the security concerns have reached a level that even the trusted associates or the third-party vendors can be […]