All Blog Posts

Cyber Awareness Month: Developing Doctrine Needs Oversight

The challenge faced by the organization is the balance between the written doctrine, and the unwritten or ‘oral doctrine’ that develops naturally and in tandem with a degree of more acute intuition as experience is gained and incident response capabilities improve.
Posted: 26 September 2015 by Optimal Risk Admin | with 0 comments

Why Maturity Matters

The maturity assessment introduces the more rounded character of resilience and what is required to building & maintain it. For some firms this is the first step in learning what is beyond their conceptual boundaries of focusing almost exclusively on back-up infrastructure, back-up procedures and functionality.
Posted: 23 July 2015 by Optimal Risk Admin | with 0 comments

Optimal Risk Announces New Security Threat and Breach Assessment Capability

Optimal Risk has recently expended its portfolio of services to offer a Security Threat & Breach Assessment as part of it's Risk and Resilience Assessment services based on combined specialist technology of a self-learning data protection system and advanced Natural Language Processing (NLP) algorithms.
Posted: 1 June 2015 by Optimal Risk Admin | with 0 comments

Why Resilience Fails - Part Two

We have lots of moving parts in security, planning, technology, management, and preparing resilience. This brings complexity and there are typically problems on any given day with the way technology, methods, procedures and policy all interlock or integrate and the way people collaborate. If we want to look for the place where the majority of security failure is found, it is in this nexus of complexity and integration, and it is the simple truth of the industry we live in.
Posted: 28 May 2015 by Optimal Risk Admin | with 0 comments

Why Resilience Fails - Part One

There are lots of ways that security fails but we should consider the broader issue of resilience. When we look to the real reasons why resilience fails is often comes down to how the organisation deals with ‘the unexpected’, or how it functions under pressure of a breach and here we can look at very human issues
Posted: 5 May 2015 by Optimal Risk Admin | with 0 comments

‘Future-Proofing’ against Converged Information Risk

Cyber risk scenarios present a new challenge to security and risk planners. The key to developing converged security risk strategy through scenarios is that the outcomes must lead to decisions that effectively mitigate information risk from physical, human, and cyber threats.
Posted: 28 March 2014 by Optimal Risk Admin | with 0 comments

How Red Teaming Gain Greater Immediate Traction Over Auditing

The 'learning by doing' opportunity that security exercises provide, is crucial to identifying failures in breach incident response as well as failures in security. So the appropriate design of a Red Team process will ensure that a balance is achieved between reinforcing security, and preparing the appropriate response.
Posted: 28 March 2014 by Optimal Risk Admin | with 0 comments
Displaying results 1-7 (of 30)
 |<  < 1 2 3 4 5  >  >|