Thank you for registering to watch Helping boards drive strategic advantage by strengthening risk oversight

 
Request a demo of Camms.Risk

Resources

Read and view the latest resources and insights from the Camms team.

Engaging corporate governance to improve cyber risk management

Webinar | On-Demand

The frequency and cost of cyber incidents is increasing for Australian businesses. Boards have a key governance role in cyber risk management and decision making to ensure their organisation’s are both secure and resilient.

Why reporting cyber risks is essential to combating cyber crime

Blog | November 12, 2020

If you’ve been following the news in 2020, and let’s be fair, who hasn’t, you may have noticed – between the headlines of US election drama and burgeoning pandemic numbers – that cyber crime is well and truly on the rise.

From Australian Prime Minister, Scott Morrison’s alarming announcement in June, that a foreign government had been discovered undertaking “malicious” cyber attacks against Australian government agencies; to the numerous hacking scandals plaguing the 2020 US election race.

But it’s not just the largest organisations who are at risk of cyber attacks – many organisations and businesses moving to work-from-home arrangements earlier this year fell victim to opportunistic cyber criminals, making the most of easy access to remote IT systems.

In September, global IT and tech news site ZDNet, reported that there had been a “sharp rise in sophisticated hands-on hacking campaigns” in 2020, with the first half of the year showing more incidents than all of 2019.

The findings came from a report from cyber security company Crowdstrike, and were based on “potential hands-on intrusions” identified by their research team.

“The first half of 2020 saw 41,000 intrusions, a higher figure than the 35,000 detected during all of 2019, according to the company,” Danny Palmer, author of the ZDNet article reported.

“Hands-on campaigns are based around hackers gaining access to the network – often via leaked or stolen credentials to an employee account or an exposed RDP server – then using the legitimate access those accounts or systems offer to move across the network, gradually securing the means to gain more and more access.”

The key to successfully integrating your planning and risk processes

eBook | Download

The current climate has proven without a doubt that both local and global events have great potential to significantly impact an organisation, and how it operates.

The Journey to Success Starts with Risk & Strategy Integration

Webinar | On-demand

Business leaders know that to generate returns there is a degree of risk-taking needed. Despite this, many struggle to see the value in integrating their risk management and strategic planning activities.