Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Organizational Resilience: Insights from Paul Dwyer on DORA

Discover the critical components of organizational resilience with expert Paul Dwyer in this enlightening discussion centered around the Digital Operational Resilience Act (DORA). Paul emphasizes the fundamental aspect of resilience, which revolves around rigorous testing, learning from those tests, and implementing improvements. It's about proving that you've not only conducted tests but have also adapted and grown from the experience.

DORA Act: Understanding Criminal Penalties with Paul Dwyer

Join us in this eye-opening discussion with renowned expert Paul Dwyer as we delve into the Digital Operational Resilience Act (DORA) and its potential criminal penalties. Paul sheds light on the accuracy of claims regarding potential prison sentences under DORA. Indeed, the legislation includes provisions for criminal penalties, making it essential for organizations to fully grasp its implications.

DORA: Digital Operational Resilience Act w/ Paul Dwyer

Paul Dwyer on how DORA or Digital Operational Resilience Act affects organizations in the EU. GUEST BIOS Paul C Dwyer Paul C Dwyer stands among the world’s leading cybersecurity, risk, and compliance authorities. As CEO of Cyber Risk International, he excels in corporate and enterprise security, crafting cyber defence programs, and safeguarding business operations for clients. He also serves as the founder and President of the ICTTF International Cyber Threat Task Force, leading a community of over 30,000 professionals in their mission to combat cyber threats and promote industry diversity.

DORA Act: Cybersecurity Is An Investment | Paul Dwyer

Paul Dwyer talks about cybersecurity as an investment. The Digital Operational Resilience Act, or DORA, is set to redefine the landscape of digital security and operational resilience. In this video, we explore the key provisions and implications of DORA, which aims to strengthen the cybersecurity framework across the European Union. GUEST BIOS.

The DORA Act: Transforming Digital Operational Resilience in Cybersecurity

The Digital Operational Resilience Act, or DORA, is set to redefine the landscape of digital security and operational resilience. In this video, we explore the key provisions and implications of DORA, which aims to strengthen the cybersecurity framework across the European Union.

DORA Compliance Made Clear: Essential Training for Safeguarding Financial Institutions w/ Paul Dwyer

Welcome to Razorwire, the podcast that cuts through the noise and delivers the sharpest insights in the industry. I'm your host, Jim, and I am thrilled to have you join us for another episode packed with cutting-edge information. Now, I know you're constantly bombarded with countless podcasts and resources vying for your attention, but let me give you three compelling reasons why Razorwire should be at the top of your playlist. Firstly, we have a very special guest today: Paul C Dwyer.

Real-World Security Testing: Uncovering Vulnerabilities in Uninterrupted Power Supplies

Think your organization's security is rock-solid? It's time to put it to the real-world test! In this eye-opening video, we share a fascinating story of a security assessment that revealed some shocking vulnerabilities. When a company claimed to have a secure environment, they decided to take it a step further and put their confidence to the test. They asked, "Are you sure you want this real-world?" And the answer was a resounding "Yes!".

The Importance of Defense and Depth in Cybersecurity

In today's digital landscape, defense and depth are absolutely crucial for the security of any organization. Join us as we delve into the world of cybersecurity with Arctic Wolf and explore the significance of this foundational concept. We'll take a deep dive into various aspects of defense and depth, including its role in safeguarding endpoint devices, securing network infrastructure, and protecting cloud resources. In a rapidly evolving threat landscape, it's essential to leave no stone unturned when it comes to security.

From Security Onions to Icebergs: Evolving Cybersecurity Strategies

Join us on a journey through the evolution of cybersecurity strategies! 🌐🛡️ Back in the day, we used to refer to it as the "security onion," where each layer represented a different piece of the puzzle, all in an effort to protect the precious asset at the core—your data or critical servers. But times have changed, and with the shift to the cloud and modern technology, we've adopted a new analogy: the "security iceberg.".

Endpoint Security: More Than Just Windows Machines

Let's talk endpoint security with a dose of reality! 🛡️💻 In this eye-opening discussion, we explore the concept that attackers ultimately aim for an endpoint. But here's the catch: defining what an endpoint means in today's complex digital landscape isn't as straightforward as it seems. If your idea of an endpoint is limited to just Windows machines, you might be in for a surprise. There's a lot more to it! 🌐