STICKY

Resilience | June 20, 2018

Resilience: a Proactive vs Reactive approach

Resilience has been there in a small scale much before organizations has started talking about it. In most cases Resilience as a pro-active approach or in much common words – […]


Share this:

Resilience | September 10, 2018

Adapting changes:City Resilience

The world is at the mid of climate change ,that building resilience for each city have become necessity of the hour. City Resilience is a vast topic that is structured […]


Share this:

Cyber Resilience | September 1, 2018

Cyber Insurance as a step towards Cyber Resilience

While thinking about Cyber Resilience from Cyber Security, the very first change in thought process is we accept the fact that our security mechanisms / defense strategies will fail, in […]


Share this:

Business Continuity | July 18, 2018

Peer Collaboration to effectively Manage Third Party Risks

Background The threat landscape is increasing everyday, and so are the need to comply with the changing regulations, and all this in alignment with corporate goals. When we consider third-party […]


Share this:

Cyber Security | July 18, 2018

Dealing the Risk with Smart Things

During this period of digital transformations TPRM is the buzz word for most of the corporate services. When TPRM deals with analyzing and controlling risks attached to the operations, data […]


Share this:

Case Analysis | July 9, 2018

Case: PNB $1.77 Billion fraud via SWIFT system

Background SWIFT & CBS SWIFT is a messaging system used by banks / lenders around the globe to transfer foreign money between them.  The banks have Core Banking System (CBS) […]


Share this:

Basics | July 8, 2018

Differentiating Incident & Problem Management

Incident is a negative event or an event with negative outcomes. In general, Incident, Problem, are terms which are used interchangeably and in some places, to top up the confusion, […]


Share this:

Business Continuity | July 5, 2018

Leveraging Third Party Risk Assessment

A risk develops when there is a threat exploiting the vulnerability. Nowadays the security concerns have reached a level that even the trusted associates or the third-party vendors can be […]


Share this: