About
For over 25 years, I have been at the forefront of cybersecurity and the management of…
Articles by David
Activity
16K followers
Experience
Publications
-
Surviving Contact with Reality - Crisis exercises as a key element of a cyber incident and crisis management response
PwC
Corporations occasionally face dramatic, even extinction-level crises that defy incident response plans housed in a single department, or present contingencies that have no prior planning. These events don’t happen often, but when they do, they can damage share price, reputation, and careers from the Board, the C-Suite, and many other positions further down the corporate ladder. How does this happen?
Other authorsSee publication -
US State of Cybercrime Survey 2015
See publicationThe US State of Cybercrime Survey is a collaborative effort with PwC, CSO, the CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the U.S. Secret Service. We found rising concern among the 500 US executives, security experts, and others from the public and private sectors who participated. In fact, 76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. Organizations…
The US State of Cybercrime Survey is a collaborative effort with PwC, CSO, the CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the U.S. Secret Service. We found rising concern among the 500 US executives, security experts, and others from the public and private sectors who participated. In fact, 76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. Organizations must summon the vision, determination, skills, and resources to build a risk-based cybersecurity program that can quickly detect, respond to, and limit fast-moving threats.
-
PwC's 2015 US CEO Survey: Secure Assets
See publicationConcern over cyber threats has CEOs warming to government collaboration. With cyber attacks the new normal in business, CEOs from the biggest companies expressed the highest concern over cybersecurity. Compared to all other hindrances to growth, cyber threats caused the sharpest uptick in worry for US CEOs. And surprisingly, while CEOs see over-regulation as a growth impediment, a relatively large number say they welcome government-business collaboration on cybersecurity—signaling a shift for…
Concern over cyber threats has CEOs warming to government collaboration. With cyber attacks the new normal in business, CEOs from the biggest companies expressed the highest concern over cybersecurity. Compared to all other hindrances to growth, cyber threats caused the sharpest uptick in worry for US CEOs. And surprisingly, while CEOs see over-regulation as a growth impediment, a relatively large number say they welcome government-business collaboration on cybersecurity—signaling a shift for the sake of securing business ecosystems.
-
Global State of Information Security Survey 2015
See publicationSecurity breaches are on the rise, and it is no surprise to find that as the number of information security incidents continues to mount, so do financial losses. Cyber risks will never be completely eliminated. Today, organisations must remain vigilant and agile in the face of a continually evolving threat landscape. Find out why your organisation should consider implementing a risk-based approach to security that prioritises your most valuable assets and proactively addresses your most…
Security breaches are on the rise, and it is no surprise to find that as the number of information security incidents continues to mount, so do financial losses. Cyber risks will never be completely eliminated. Today, organisations must remain vigilant and agile in the face of a continually evolving threat landscape. Find out why your organisation should consider implementing a risk-based approach to security that prioritises your most valuable assets and proactively addresses your most relevant threats.
-
Using Technology to Detect Fraud
Pennsylvania Institute of Public Accountants
See publicationTechnology is a double-edged sword. While recent technological advances have made our lives easier, they have also paved the way for people who commit fraud. Fortunately, companies can also use technology to analyze data in real time and search for patterns of behavior that point to fraud. By combining a 60+ year-old mathematical principle with modern technological capabilities, large-scale relational databases can be utilized to uncover fraudulent activities buried in voluminous repositories…
Technology is a double-edged sword. While recent technological advances have made our lives easier, they have also paved the way for people who commit fraud. Fortunately, companies can also use technology to analyze data in real time and search for patterns of behavior that point to fraud. By combining a 60+ year-old mathematical principle with modern technological capabilities, large-scale relational databases can be utilized to uncover fraudulent activities buried in voluminous repositories of electronic information.
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content