How can AI help build Corporate Resilience?

Building resilience is no longer just about bouncing back from setbacks; it’s about adapting, innovating, and staying ahead of the curve. And in this pursuit, artificial intelligence (AI) can be a powerful ally. AI has the potential to revolutionise the way organisations approach resilience by offering valuable insights, enhancing decision-making processes, and optimising operations. Here’s how AI can help you build world class resilience: 1. Data-driven insights: AI excels at Read more…

Weathering the Storm – How to Build Resilience for Severe Climate Events

Severe weather warnings across the entire UK, including a rare red warning in Scotland, meaning an immediate threat to life, have been issues in recent days. Predictions of changing weather patterns may lead to more frequent episodes in the future.  How can organisations effectively plan for, respond to, and recover from a severe weather event, specifically focusing on a red weather warning scenario? To effectively prepare for a red weather Read more…

What is physical security engineering?

Physical security engineering is a specialized discipline within the broader field of security engineering. It focuses on the design, implementation, and maintenance of physical security measures to protect people, property, and information from unauthorized access, damage, theft, or harm. Physical security engineering involves the application of engineering principles to create a secure physical environment for individuals, organizations, and critical infrastructure. Key aspects of physical security engineering include: Access Control: Physical Read more…

What are the principles of Incident Response?

Incident Response refers to the process of managing and addressing security incidents when they occur. Effective incident response is crucial for minimizing the impact of security breaches and ensuring a swift recovery. The principles of incident response can be summarized as follows: Preparation: Develop and maintain an incident response plan that outlines the procedures, roles, and responsibilities of team members. Regularly update the plan to address emerging threats and changes Read more…

What are the principles of security?

The principles of security provide a framework for designing and implementing effective security measures to protect assets, such as data, information, systems, and people, from various threats and risks. While there are different models and frameworks, a commonly cited set of security principles for information security includes: Confidentiality: Ensuring that information is only accessible to those who have the proper authorization. This principle prevents unauthorized access to sensitive data. Integrity: Read more…

How do you protect against a ransomware attack?

A typical ransomware attack follows a series of stages, from initial infection to encryption of files and the ransom demand. Here’s an overview of how a ransomware attack typically occurs: Delivery: Ransomware typically enters a system through phishing emails, malicious attachments, or compromised websites. Phishing emails often contain seemingly legitimate links or attachments that, when clicked or opened, download the ransomware onto the victim’s device. Infection: Once the malicious payload Read more…

How do you undertake a business continuity impact assessment?

A Business Continuity Impact Assessment (BCIA) is a crucial step in the development of a business continuity plan. It helps you identify potential risks and assess their potential impact on your organization’s critical functions. Here are the steps to carry out a BCIA: Define the Scope and Objectives: Clearly define the scope of your BCIA, including the specific areas or processes you want to assess. Identify the objectives of the Read more…

What is the difference between OT security and IT security?

Operational Technology (OT) security and Information Technology (IT) security are two distinct domains of cybersecurity, each focused on protecting different types of systems and infrastructure within an organization. Here are the key differences between OT security and IT security: Scope and Focus: IT Security: IT security primarily focuses on protecting digital information, computer systems, networks, and data. It deals with safeguarding information assets such as databases, servers, laptops, desktops, and Read more…

How do you undertake threat modelling?

Threat modeling is a systematic process for identifying and assessing security threats and vulnerabilities in a system, application, or organization. It helps you proactively identify potential risks and take appropriate measures to mitigate them. Here’s a step-by-step guide on how to undertake threat modeling: Define the Scope: Clearly define what you are threat modeling. It could be a specific application, a system, a network, or an entire organization. Identify Assets: Read more…

What is the 4th Turning and what are the Implications for Civil Security?

The Fourth Turning is a theory proposed by historians William Strauss and Neil Howe in their 1997 book titled “The Fourth Turning: An American Prophecy.” The theory suggests that history can be divided into four generational cycles, or “turnings,” each lasting about 20-25 years. These turnings are characterized by distinct social, political, and cultural dynamics. First Turning: High (The High) – This is a period of strong institutions and societal Read more…