Black Arrow Cyber Threat Briefing 16 December 2022:
-Executives Take More Cyber Security Risks Than Office Workers
-CISO Role is Diversifying from Technology to Leadership & Communication Skills
-How Emerging AIs, Like ChatGPT, Can Turn Anyone into a Ransomware and Malware Threat Actor
-Cyber Security Drives Improvements in Business Goals
-Incoming FCA Chair Says Crypto Firms Facilitate Money Laundering
-Managing Cyber Risk in 2023: The People Element
-What We Can't See Can Hurt Us
-Uber Suffers New Data Breach After Attack on Vendor, Info Leaked Online
-When Companies Compensate the Hackers, We All Foot the Bill
-HSE Cyber-Attack Costs Ireland $83m So Far
Read More
Black Arrow Adminivanti, marlin hawk, chatgpt, openai, deloitte, fca, ashley alder, cri, cyber risk index, uber, teqtivity, tripactions, uberleaks, hse, irish health service, rackspace, lockbit, truebot, clop, play ransomware, clop ransomware, azov ransomware, royal ransomware, brooklyn hospital, hive ransomware, mirrorstealer, zscaler, qbot, svg files, xnspy, eufy, anker, sequoia, lastpass, telstra, fbi infraguard, tpg, iinet, westnet, chaos rat, ftx, sam bankman-fried, loan fee fraud, lego, bricklink, sha-1, osv-scanner, gotrim botnet, twitter, elon musk, meta, tiktok, microsoft teams, pci-dss 4.0, oecd, ukraine, muddywater, muddywater apt, charming kitten, citrix, citrix adc, citrix gateway, veeam, adobe, vmware, samba, fortinet, atlassian, amazon ecr, patch tuesday, akamai, world cup, microsoft defender, avast, avg, powershell, fubotv, mttr, black arrow, black arrow cyber, cyber experts, cyber consulting, cyber investigators, cyber, cyber security, infosec, information security, threat intel, threat intelligence, threat report, business risk, business risks, cyber risk management, risk management, cyber risk, cyber security risk, cyber risk assessment, risk assessment, cyber incident response, cyber incident response team, cyber emergency response, computer incident response, computer emergency response, emergency response, subject matter experts, it security, trusted adviser, trusted partner, vciso, virtual chief information security officer, viso, information security officer, security executive on demand, security as a service, security on demand, cyber security strategy, cyber strategy, cyber kill chain, security as a a service, security-as-a-service, hr, human resources, human resources management, hrm, british intelligence, national security, uk national security, military intelligence, mod, ministry of defence, police, law enforcement, ftse 100, ftse100, offshore financial services, gfsc, guernsey financial services commission, fortune 500, fortune500, ncsc, national cyber security centre, cpni, mi5, gchq, cert, cert-uk, cert.gg, five eyes, cyber guernsey, guernsey cyber, nca, national crime agency, europol, interpol, enisa, nato, australian cyber security centre, acsc, canadian centre for cyber security, cccs, new zealand national cyber security centre, ncsc-nz, cybersecurity and infrastructure agency, cisa, national security administration, nsa, federal bureau of investigation, fbi, central intelligence agency, cia, department of homeland security, dhs, secret service, odpa, office of the data protection authority, ico, information commissioners office, isc2, isaca, comptia, sans, sme, smb, small business, medium sized business, accounting, law firms, legal sector, academia, education, schools, retail, maritime, aviation, aerospace, transport, defence, defense, defence contractor, cni, scada, ics, industrial control systems, operational technology, ot, healthcare, medical, pharma, pharmaceuticals, pci-dss, payment card, payment card industry, estate agents, estate agency, child safety, parental controls, regulated firms, financial services, critical infrastructure, mergers and acquisitions, manda, m&a, research and development, r&d, intellectual property, ip, telecoms, telecommunications, executives, executive, insiders, insider threat, staff, users, end users, senior executives, c-suite, boards, human element, human centric security, human centric, weakest link, boardroom, board room, ciso, ceo, cto, cio, cfo, nist, cyber essentials, cyber essentials plus, iasme, iasme governance, iasme gold, iso 27001, iso27001, cyber killchain, mitre, mitre att&ck, cis, cis controls, cap1753, cap 1753, caa, civil aviation authority, fraud investigations, forensics, cyber forensics, forensic investigations, expert witness, technical investigations, apt, china, russia, iran, north korea, nation state actors, gru, svr, fsb, ransomware, ransomware-as-a-service, raas, crime-as-a-service, bec, business email compromise, email, social engineering, phishing, spear-phishing, whaling, credentials, credential stuffing, account takeover, account takeovers, ato, extortion, blackmail, denial of service, distributed denial of service, dos, ddos, rddos, botnet, cryptomining, cryptojacking, rootkits, rootkit, shadow it, remote code execution, rce, zero-day, malware, vishing, smishing, heat attacks, heat, highly evasive adaptive threats, rat, remote access trojan, cyber bullying, cyber stalking, sextortion, blockchain, wipers, destructive attacks, vulnerability, vulnerabilities, vulnerability management, patch management, patching, kev, kevs, known exploited vulnerabilities, epss, cvss, insurance, cyber insurance, incident response, incident response plan, disaster recovery, disaster recovery plan, drp, business continuity, business continuity planning, business continuity plan, training, education and awareness training, awareness, exercising, exercise, proctored exercise, facilitated exercise, simulations, gap analysis, cyber gap analysis, board upskilling, senior executive cyber risk and governance, senior executive cyber risk and governance workshops, technical assessment, technical analysis, penetration testing, pentesting, physical penetration testing, tas, targeted attack simulations, iso 27001 iso27001, technical IT security, iam, idam, identity and access management, digital transformation, change management, compliance, grc, governance risk and compliance, esg, hackers, criminals, cyber criminals, cyber warfare, espionage, cyber espionage, fraudsters, fraud, scammers, scams, scam, organised crime, criminal actor, criminal actors, terrorism, terrorists, cyber terrorists, cyber terrorism, supply chain, third parties, mssp, msp, managed service provider, managed security service provider, external it provider, internal it, apple, mac, macos, ios, iphone, android, microsoft, windows, cloud, saas, iaas, paas, dark web, databases, encryption, cryptocurrencies, iot, ai, endpoint protection, antivirus, antimalware, wfh, work from home, dns, email gateway, gdpr, online, open source, attack surface, edr, mdr, xdr, monitoring and detection, api, andorra, anguilla, antigua and barbuda, aruba, bahamas, barbados, bermuda, british virgin islands, bvi, cayman islands, channel islands, ci, cyprus, dominica, dublin, dutch antilles, gibraltar, grenada, guernsey, isle of man, jersey, liechtenstein, london, luxembourg, malta, monaco, netherlands antilles, philippines, st kitts and nevis, st lucia, st vincent and grenadines, switzerland, turks and caicos islands, scotland, edinburgh, glasgow, bristol, southampton, portsmouth, fareham, exeter, europe, offshore, south west, south east, uk, england, great britain, british isles, germany, south africa, ireland, australia, new zealand, canada