What we’re seeing across industries is that cyber incidents don’t stay contained within one organization. They cascade across the ecosystem. Thanks to Marsh Risk for inviting CYGNVS to run a an interactive tabletop exercise at the Marsh Aviation Summit with senior executives from airlines, airports, OEMs, and service providers. The scenario was simple. A ransomware attack hits a ground-handling vendor late on a Friday. The challenge is not detection. It’s coordination. Their systems are down. The airline needs answers. Multiple organizations are now involved, each with their own tools, protocols, and constraints. What ends up happening is familiar. People fall back to WhatsApp groups, personal phones, and ad hoc channels. That’s where things start to break. Decisions get fragmented. Context is lost. Sensitive conversations and evidence spread across personal devices, often across company lines. What this highlights is a broader issue. Ecosystems are not designed to respond together under pressure. That’s why Out-of-Band matters. It creates a neutral, secure environment where organizations can coordinate when primary systems are unavailable or compromised. Not just within a company, but across them. If your operation went down tonight due to a cyber incident, what does your first hour actually look like? Learn more at https://lnkd.in/gPrgWU5f #CyberResilience #AviationSecurity #IncidentResponse #CrisisManagement #CyberSecurity #RiskManagement #OperationalResilience #TTX #MarshAviationSummit
Cyber incidents cascade across ecosystems, coordination is key
More Relevant Posts
-
Your home router is the new corporate firewall. 🛡️ For years, "Executive Protection" meant bodyguards and motorcades. Today, the most dangerous threat to a CEO isn't in the lobby—it’s in their living room. According to the latest 2025 Ponemon Institute Report, attacks on business leaders have surged to 51%. Why? Because the "Office Home" is the path of least resistance. Cybercriminals aren’t trying to break through your company’s million-dollar firewall anymore. Instead, they are: 1️⃣ Hacking unsecured home Wi-Fi networks. 2️⃣ Creating AI deepfakes of CEOs to authorize fraudulent wires. 3️⃣ Targeting family members to gain "lateral access" to the executive. The data is clear: Digital Executive Protection (DEP) is no longer a luxury. It’s a core requirement for enterprise risk management. If you are protecting the office but ignoring the home, you’re leaving the back door wide open. Question for the network: Is your organization extending its security perimeter to the homes of its leadership team? #CyberSecurity #ExecutiveProtection #CISO #DigitalPrivacy #RiskManagement
To view or add a comment, sign in
-
-
Cyber safety in modern times — ideas for C-level executives to adopt when traveling overseas. #cybersafety #cybertips #VIPcybersafety https://lnkd.in/gxWvX2xn
To view or add a comment, sign in
-
Australia has launched a cyber review board modeled on version disbanded in US Australia is establishing a Cyber Incident Review Board to conduct no-fault, post-incident reviews of significant cyberattacks on government and industry, with a mandate to extract systemic lessons rather than assign individual or corporate culpability. Home Affairs and Cyber Security Minister Tony Burke announced seven appointments this week, with the board chaired by Narelle Devine, global CISO at Telstra. The majority-female membership is drawn from Boeing Australia, NBN Co, UNSW, Allens, Toll Group, and SA Power Networks. The model is explicitly the US Cyber Safety Review Board established by the Biden administration in 2022, which produced reports on Log4j, Lapsus$, and the Microsoft China hack before being disbanded by the Trump administration while mid-investigation into Salt Typhoon. Unlike the US board, which relied on voluntary cooperation, the Australian version can compel information from entities that decline to participate. Whether or not this compulsion power is tested against organisations that prefer to settle civil claims quietly rather than expose their incident response in a public review is yet to be seen. #cybersecurity #australiancybersecurity #aics #cyberreviewboard #ausgov #incidentresponse #criticalinfrastructure #log4j Telstra Boeing nbn® Australia Allens Toll Group Australian Institute of Cyber Security (AICS) https://lnkd.in/ghaXe8Nm
To view or add a comment, sign in
-
Australia has launched a cyber review board modeled on version disbanded in US Australia is establishing a Cyber Incident Review Board to conduct no-fault, post-incident reviews of significant cyberattacks on government and industry, with a mandate to extract systemic lessons rather than assign individual or corporate culpability. Home Affairs and Cyber Security Minister Tony Burke announced seven appointments this week, with the board chaired by Narelle Devine, global CISO at Telstra. The majority-female membership is drawn from Boeing Australia, NBN Co, UNSW, Allens, Toll Group, and SA Power Networks. The model is explicitly the US Cyber Safety Review Board established by the Biden administration in 2022, which produced reports on Log4j, Lapsus$, and the Microsoft China hack before being disbanded by the Trump administration while mid-investigation into Salt Typhoon. Unlike the US board, which relied on voluntary cooperation, the Australian version can compel information from entities that decline to participate. Whether or not this compulsion power is tested against organisations that prefer to settle civil claims quietly rather than expose their incident response in a public review is yet to be seen. #cybersecurity #australiancybersecurity #aics #cyberreviewboard #ausgov #incidentresponse #criticalinfrastructure #log4j Telstra Boeing nbn® Australia Allens Toll Group Australian Institute of Cyber Security (AICS) https://lnkd.in/gKagz92i
To view or add a comment, sign in
-
Cybersecurity Alone Doesn’t Protect Conversations. When organizations think about information security, the focus is often on networks, endpoints, and data systems. But many sensitive discussions never touch a server. Board meetings. Executive travel. Legal strategy sessions. These environments can be vulnerable to covert surveillance such as hidden microphones, cameras, GPS trackers, or compromised meeting spaces. These threats don’t announce themselves, and they often bypass traditional IT and cyber controls entirely. Technical Surveillance Countermeasures (TSCM) plays a critical role. TSCM is a specialized discipline focused on identifying and mitigating unauthorized surveillance in physical environments. It combines technical detection, environmental analysis, and investigative expertise to protect confidential conversations, leadership privacy, and strategic decision-making. As threat actors become more sophisticated and surveillance tools more accessible, organizations need to think beyond cyber alone and take a holistic approach to information protection. At TNG, we provide professional TSCM services to help organizations identify covert surveillance risks, assess exposure, and safeguard sensitive environments before compromise occurs. #Surveillance #SecurityLeadership #RiskManagement #ExecutiveProtection #TNGDefense
To view or add a comment, sign in
-
-
Cybersecurity incidents are rising across global systems this week. Attacks are becoming faster, and data exposure is scaling across industries. US based utility technology provider Itron confirmed a cyberattack on internal IT systems. Containment measures were taken, and customer-facing systems were not impacted, according to company statements. A major data leak linked to the ShinyHunters group has also emerged, affecting over 40 global organizations. Around 38 million records are reportedly exposed across retail, healthcare, logistics, and hospitality. Another concern is emerging from within incident response ecosystems, raising questions around insider risk and governance. The pattern is clear, data theft is now the primary objective, while critical infrastructure remains under constant threat. Cybersecurity is shifting from isolated incidents to systemic exposure across connected environments. Read More: https://lnkd.in/dwaCjjsY #CybersecurityIncidents #Cybersecurity #DataBreach #CriticalInfrastructure #ShinyHunters #EmergingTech #TECHxMedia #TECHx 🔔 Follow TECHx Media & TECHx Arabic for timely, exclusive updates from the tech industry and beyond!
To view or add a comment, sign in
-
-
Can a movie be only 73 seconds long. Imagine waking up to find all those expensive Security Systems standing helpless against an attack that took exactly 73 seconds to pierce your company core. Is this an action movie script or a terrifying reality we might face soon. It all started when a study revealed that in certain cases an Attacker needs no more than a minute and 13 seconds to complete Initial Access and reach the first device on the network. The secret lies in Automation used by hackers to find your weak spot in seconds. To put it simply, imagine your company as a large villa. Traditional Security is the fence and the lock, but today hackers use a sophisticated Drone circling around looking for a cracked window or a hole in the fence in seconds. This incident shows us that the problem is not just a vulnerability, but the terrifying time gap between the breach and the moment the Security Team takes action. Recovery takes an average of 24 hours if you are fast, which means the hacker has a whole day to roam freely inside your Network. We must clarify that these numbers 73 seconds and 24 hours are just illustrative figures depending on factors like network complexity, team readiness, and exploit ease. The flaw here is not just late #Patching. It is a flaw in the methodology itself that relies on Static Defense while the attack has become very Dynamic, targeting the weakest link in the chain to hit everyone. The impact can be catastrophic because Unauthorized Access happening in seconds opens the door for Data Exfiltration and sensitive leaks, killing any business Reputation. This teaches us that relying on Manual Testing alone is digital suicide. That is why I believe the real solution is moving to Proactive Security. You need smart systems performing Continuous Security Testing and simulating attacks around the clock. This is where the #CTEM or Continuous Threat Exposure Management family comes in. It acts like a fitness trainer keeping you ready all year against real threats. There are other tools like the #EASM or External Attack Surface Management family, which is basically a 24 hour spotlight scouting outside your company villa to find any forgotten window or fence hole that the hacker Drone sees before he exploits it. Of course, we can use #BAS or Breach and Attack Simulation, which is like a hacker robot you run yourself to test if your Firewalls and Antivirus are awake or sleeping. I have not seen these tools in practice yet, but they exist and have their own market. This is alongside essentials like #MFA, Least Privilege, segmentation, #EndpointSecurity, #AccessControl, and #Awareness. Finally, the one who spots the vulnerability first, is the one who sets the rules of the game. You are a target until proven otherwise. #E.H. : https://lnkd.in/dUSKUe5t https://lnkd.in/dkK5cPVW https://lnkd.in/dEQRP_xX
To view or add a comment, sign in
-
-
You can spend £1M on the world’s best cybersecurity stack, and it can still be defeated by a £0.00 mistake. 📉 We often treat cybersecurity as a "math problem" that can be solved with more encryption, better AI, and bigger firewalls. But the truth is much simpler - and more dangerous. In 2026, hackers aren’t trying to "break in" through the back door anymore. They are simply waiting for someone to open the front door for them. Whether it’s a high-pressure "emergency" email or a clever social engineering trick, the 'Human Side' is now the primary attack vector. Why awareness beats automation every time: 👉 Context over Code: AI can flag a suspicious link, but a trained employee can spot a suspicious "tone" from a CEO's spoofed account. 👉 The "Helpfulness" Trap: Hackers weaponise our natural instinct to be helpful. Security training turns that instinct into a healthy level of skepticism. 👉 Process is a Firewall: When a "standard operating procedure" requires a phone call before a password reset, no amount of phishing can bypass the human check. Great technology is the foundation, but culture is the real defense. If your team doesn't know why the locks are there, they’ll eventually leave a window open. We've put together a deeper dive into how to build a "Human Firewall" that actually stands up to modern threats. Link to the full breakdown below. 👇 https://lnkd.in/evnqZuxr #cybersecurity #delta365 #cyberattack #humanfirewall
To view or add a comment, sign in
-
“Cybersecurity is something IT handles”…not quite the full picture anymore. 🫣 Really interesting breakdown on how the biggest risk in 2026 isn’t weak systems - it’s people being people! It doesn’t have to be that way. Done right, it should feel: ✅Teams that pause before reacting to “urgent” requests ✅Simple processes that remove guesswork under pressure ✅Awareness that turns everyday staff into the first line of defence🫡 The difference between having strong tools…and having a team that actually knows how to use judgment when it matters most.💌 When was the last time your organisation looked at cybersecurity from the human angle, not just the technical one? #Delta365 #CyberSecurity #BusinessIT #HumanRisk #ManagedIT
You can spend £1M on the world’s best cybersecurity stack, and it can still be defeated by a £0.00 mistake. 📉 We often treat cybersecurity as a "math problem" that can be solved with more encryption, better AI, and bigger firewalls. But the truth is much simpler - and more dangerous. In 2026, hackers aren’t trying to "break in" through the back door anymore. They are simply waiting for someone to open the front door for them. Whether it’s a high-pressure "emergency" email or a clever social engineering trick, the 'Human Side' is now the primary attack vector. Why awareness beats automation every time: 👉 Context over Code: AI can flag a suspicious link, but a trained employee can spot a suspicious "tone" from a CEO's spoofed account. 👉 The "Helpfulness" Trap: Hackers weaponise our natural instinct to be helpful. Security training turns that instinct into a healthy level of skepticism. 👉 Process is a Firewall: When a "standard operating procedure" requires a phone call before a password reset, no amount of phishing can bypass the human check. Great technology is the foundation, but culture is the real defense. If your team doesn't know why the locks are there, they’ll eventually leave a window open. We've put together a deeper dive into how to build a "Human Firewall" that actually stands up to modern threats. Link to the full breakdown below. 👇 https://lnkd.in/evnqZuxr #cybersecurity #delta365 #cyberattack #humanfirewall
To view or add a comment, sign in
-
Last night’s incident during the dinner event in Washington, D.C., was a sharp reminder that even the most controlled environments can face unexpected breaches. According to multiple news outlets, a gunman approached a security checkpoint near the event venue, resulting in an officer being injured before the situation was quickly contained. While the investigation continues, one thing is clear: rapid response and layered security prevented a far worse outcome. While this was a physical security breach, the lessons for cybersecurity are strikingly similar and deeply relevant. 1. Perimeter Security Is Never Enough - Attackers can bypass even well‑designed checkpoints. In cybersecurity, this is why the 'assume breach' mindset must be the default. 2. Layered Defense Saves Lives and Systems - Just as protective gear reduced harm, cyber defense‑in‑depth (MFA, segmentation, zero trust, monitoring) ensures no single failure becomes catastrophic. 3. Rapid Detection and Response Is Critical - The swift action by security teams mirrors the importance of SOC readiness, playbooks, and automation in containing cyber incidents. 4. Insider or Authorized‑Access Risks Are Real - Reports noted the suspect had legitimate access to the area. In cyber terms, this reflects the ongoing challenge of insider threats and compromised accounts. 5. Communication Matters - Authorities quickly reassured the public and controlled misinformation. Cyber teams must collaborate with Comms and Execs to do the same during breaches. Clear, timely communication preserves trust. Thank God all attendees are safe. My thoughts and prayers are with the officer who was injured, wishing him strength and a full recovery.
To view or add a comment, sign in
Explore related topics
- How To Handle Ransomware Incidents
- Impact of Cyber Incidents on Business Reputation
- Managing Operational Risks Across Industries
- Importance of Incident Response in Cybersecurity
- Building Resilience Through Incident Response Planning
- Cybersecurity Strategies in Operational Risk Management
- Organizing Cybersecurity Drills for Ecosystem Resilience
- How Cyberattacks Impact Supply Chain Operations
- Coordinating Cross-Department Response for Corporate Security
- How to Manage IT Outages
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development