Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trust & Culture as Cornerstones of Cyber Security with Paul Dwyer

Welcome to Razorwire, where I have the pleasure of interviewing cyber security legend Paul Dwyer, president of the International Cyber Threat Task Force and CEO of Cyber Risk International. In this episode, we delve into a variety of topics within cyber security. Paul shares his extensive background and experience in the industry, highlighting the need for a cultural shift towards cyber security.

Understanding the Intelligence Cycle for Cybersecurity: Building a New ICT Infrastructure

In this video, we dive into the intelligence cycle specifically tailored for cybersecurity. With a focus on protecting digital assets, we explore the stages of Direction, Collation, Analysis, and Dissemination within the context of building a new ICT infrastructure. Starting with the initial direction, we discuss the need for a secure network architecture capable of defending against cyber threats.

Mastering Cyber Security The Sun Tzu Approach

Progress your cyber security career with our masterclass from James Rees, MD of Razorthorn Security. In part 1, we take a deep dive into one of the oldest and most highly regarded texts in history - Sun Tzu's "The Art of War" - to uncover valuable insights for information security professionals. We can't stress enough just how useful this text is for anyone in the field, and if you haven't had the opportunity to read it before, we highly recommend doing so.

Cybersecurity Risk Mitigation: Understanding the Limitations of Reducing a £2 Million Risk

We discuss a scenario where a £2 million risk can potentially be mitigated to £100,000 through a £50,000 investment. However, it's crucial to comprehend the inherent limitations of risk reduction in the cybersecurity realm. As seasoned cybersecurity professionals, we acknowledge that no company, solution, or defense mechanism can guarantee 100% protection against emerging threats. Stay updated and empowered with the latest insights to safeguard your digital assets effectively.

Mastering Cyber Security - Overcoming Professional Challenges

Part 1 – Overcoming professional challenges Despite the high demand for information security professionals, the path to a successful career in this field is not without its challenges. Those who choose to pursue a career in information security must be prepared to face a range of difficulties and obstacles, from the pressure to stay up-to-date with the latest technology and trends, to the constant threat of cyber attacks.

The Rising Cost of Cyber Crime: $8 Trillion Impact on the World Economy in 2023!

In this video, we delve into the alarming estimates provided by Sub-Security Ventures, a trusted cyber crime magazine and an invaluable resource. Brace yourselves as we uncover the staggering projection that cyber crime will cost the world economy a staggering $8 trillion in 2023, up from $6 trillion just a few years ago. That's an average increase of a trillion dollars annually! But here's the shocking truth: while the cost of cyber crime skyrockets, our investment in protection organizations, whether public or private, between 2021 and 2025 is predicted to be a mere $1.75 trillion.

Cyber security and Critical Infrastructure: Are We Prepared for the Worst?

In this episode of Razorwire, I had the pleasure of speaking with Phil Tonkin from Dragos about securing critical infrastructure. Phil and I delved into the definition of critical infrastructure, the fragility of supply chains and the importance of preparing for potential attacks. We also talked about the Colonial Pipeline incident and the inextricable link between IT and OT in critical infrastructure.

Experts Monthly Mar23 20230411

Welcome back to the show! In this episode of the Razorwire podcast, I have the pleasure of discussing defence in depth with Razorthorn’s own illustrious consultants, Jamie Hayward and Tom Mills. During our conversation, we talked about the increasing number of tools and solutions available, the perils of ‘reactive’ budget allocation, as well as the changes we’re seeing in the industry and within our clients’ requirements.

Why Penetration Tests Alone Are Not Enough - The Importance of Tracking and Resolving Issues

Penetration tests are crucial to any organization's cybersecurity strategy, but they're not the whole story. Without a way of tracking and resolving the issues uncovered in these tests, they become nothing more than a snapshot in time. In the same way that software defect systems help organizations track and manage bugs, it's essential to have a system in place for measuring and addressing cybersecurity vulnerabilities. Whether deciding to fix the issue immediately or scheduling it for a future release, tracking and actioning findings is essential for staying ahead of potential threats.

Penetration Testing | Finding Skeletons Make You Stronger

Are you conducting regular penetration testing on your organization's security measures? If so, you might be missing out on a crucial step that could make you even stronger. In this video, cybersecurity expert Megan Brown shares her insights on why it's essential to proactively seek out and address any potential gaps in your security measures. As Megan explains, knowing where the bodies are - where the bones are buried - can help you identify areas of weakness and take action before they become a major issue. So why wait until it's too late?