Use SAP applications? Here’s how to respond to the security flaw.

Use SAP applications? Here’s how to respond to the security flaw May 20, 2016

By Scott A. Osterman. Cybercriminals are targeting SAP business applications by using a security defect that the global enterprise application company patched in 2010, according to the US Computer Emergency Readiness Team (US-CERT). The news should serve as a wake-up call for businesses that have been slack in updating their SAP software. That’s because the vulnerability can […]

Read the full article →

Advancing the ranks of women in cybersecurity

Advancing the ranks of women in cybersecurity March 7, 2016

By Emily Stapf and Suzanne Hall.  Cybersecurity faces a well-known talent gap. The demand for skills is great while the supply is not. One important contributor to this problem is the failure to recruit, train, and retain women. If we’re to close the talent gap, we must close the gender gap. That means executives engaging […]

Read the full article →

PwC launches cybersecurity and privacy hub

PwC Launches Cybersecurity and Privacy Hub February 29, 2016

By David Burg.  At PwC, we want to help lead an informed discussion on important cybersecurity and privacy-related issues. In the coming days, we invite you to visit Broader Perspectives, our new cybersecurity and privacy hub hosted on wsj.com. In this new platform, leaders at PwC provide insights and perspectives on the latest cybersecurity and privacy trends, […]

Read the full article →

The EU Directive on cybersecurity: A final shift in 2015

The EU Directive on Cybersecurity: A Final Shift in 2015 January 4, 2016

by David Burg and Douglas Bloom.  As 2015 drew to a close, there was yet another significant development in the global legal regime governing cybersecurity. The European Union (EU) is poised to adopt early this year a cybersecurity Directive aimed at improving members’ individual capabilities and cooperation on cybersecurity, and, most significantly for those here in […]

Read the full article →

Balancing privacy and security in the fight against cybercrime: The Cybersecurity Act of 2015

Balancing privacy and security in the fight against cybercrime: The Cybersecurity Act of 2015 December 23, 2015

by David Burg and Douglas Bloom.  Late last week, the President signed the Cybersecurity Act of 2015 (the “Act”) into law as part of the omnibus appropriations bill.  Among other things, the Act provides a framework for the sharing of cyber threat information between private industry and the government. Industry counsel has long pushed Congress for […]

Read the full article →

Cyberthreat intelligence: A call to evolve beyond the feed

Cyberthreat intelligence: A call to evolve beyond the feed December 9, 2015

By Shane Sims and Chadd Carr. Threat intelligence has come a long way from its humble beginnings, and none too soon. The nature and number of cybercriminals have expanded greatly, their methods are multiplying and their potential harm continues to increase. For those of us on the front lines, it sometimes feels like we’re running […]

Read the full article →

Japan’s Cyber3 Conference: Engaging Diverse Stakeholders to Tackle Cyber Challenges

December 1, 2015
Japan’s Cyber3 Conference: Engaging Diverse Stakeholders to Tackle Cyber Challenges

By David Burg.  Improving cybersecurity practices is a top national priority for Japan. To better understand the evolving cybersecurity environment and the issues they are grappling with, the Government of Japan, the World Economic Forum, PwC and Palo Alto Networks brought together government, academic, private sector, and other experts to tackle some of the hardest […]

Read the full article →

Assessing retail cybersecurity for the busy holiday shopping season

Assessing retail cybersecurity for the busy holiday shopping season November 12, 2015

By Bryan Oberlander and PJ Ritters. By now, most retail cybercrooks have made their holiday hit lists and have checked them twice. The question is, have retailers taken the necessary steps to safeguard against the seasonal spike in cyberthreats? If not, they certainly should. Over the past two years, some of the biggest retail cyberattacks in history […]

Read the full article →

Information Sharing and Analysis Organizations: Much Progress Has Been Made, Much Work Remains

Information Sharing and Analysis Organizations: Much Progress Has Been Made, Much Work Remains August 3, 2015

by David Burg.  A few weeks ago, PwC provided the White House and made public our Study and Considerations of Information Sharing and Analysis Organizations. Ever since President Obama issued Executive Order 13691 in February, promoting Information Sharing and Analysis Organizations (ISAOs), the private and public sectors have been trying to make sense of just […]

Read the full article →

Watershed Year for Cybercrime – Key findings from the 2015 US State of Cybercrime Survey

Key Findings from the 2015 US State of Cybercrime Survey July 9, 2015

By David Burg.  PwC published this week the key findings from the 2015 US State of Cybercrime Survey, which we co-sponsored with CSO, the CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the U.S. Secret Service.  The responses from more than 500 executives of U.S. businesses, law enforcement, and government agencies […]

Read the full article →