All Blog Posts

Addressing Espionage in Cyber Awareness Month

If companies start with the assumption that they have been the victim of espionage, and that data is still being exfiltrated consistently, then they will quickly change their security dialogue & agenda considerably. For many firms it is complex to look for evidence of victimhood unless they bring in specialists.
Posted: 16 October 2013 by Optimal Risk Admin | with 0 comments

What does your incident response look like?

Every different type of event should elicit a different response. But turn it on its head and ask what your preparation looks like and this is a very different formula, despite the fact that the two are intimately interdependent and in many ways one should be the negative image of the other.
Posted: 28 June 2013 by Optimal Risk Admin | with 0 comments