Latest posts from Cyber security updates Join us on LinkedIn PwC UK YouTube channel Subscribe to our RSS feed Join us on Facebook Follow PwC on Twitter

27 July 2017

Responding to a cyber-attack and fostering cyber resilience within your organisation

By Hamish Cameron, ‎Enterprise Resilience Specialist At the recent InfoSecurity Europe conference held at Olympia, London, we were asked to facilitate a live incident response scenario to a cyber-attack. We asked leading subject matter experts to join us on stage and play the roles of senior management who are most...

How can insurance help bridge the gaps that traditional cyber defence and IT spending can’t?

By Jacob Tapper, Associate Can you answer these questions: How would a cyber-attack affect your bottom line? What kind of attack would hurt you the most? Where does your cyber risk come from? If you can’t, you’re not alone. Against a recent backdrop of increasingly frequent and severe cyber events,...

14 July 2017

Future technology in retail part two: Take the red pill

By John Nugent, Senior Cyber Security Manager at PwC In our previous article we touched on some of the benefits that retailers expect to get from implementing emerging technologies into their business operations and highlighted the myriad security implications that must first be considered. When grappling with complex, interconnected security...

Future Technology in Retail part one: Benefits and Hazards

By John Nugent, Senior Cyber Security Manager at PwC The robots are coming! In fact, they’re already here! There is a lot of discussion right now about what intelligent, autonomous new technologies might mean for our future, including some often outlandish perspectives emanating from Hollywood. Back in the real world...

06 July 2017

Cyber insurance underwriting risk - understanding what the regulator wants

By Marta Abramska, Assistant Director & Mohammad Khan, General Insurance Partner at PwC With a number of cyber breaches making headlines across the world, cyber security should be a top priority for senior management across all industries. On the 5 July, the Bank of England’s Prudential Regulation Authority (PRA) released...

27 June 2017

Petya - the latest wave

A new wave of the combined Petya and Mischa ransomware variation, also known as ‘Goldeneye’, has been affecting a significant number of organisations across a wide range of industries since Tuesday 27 June. Many victims have already been observed, including multiple entities within Ukraine, Spain, Netherlands and the UK. This...

Cyber Criminals will always look for the path of least resistance

By James Hampshire, Cyber Security Senior Manager at PwC PwC recently hosted an event with the British Retail Consortium (BRC) in Shoreditch which brought together senior information security professionals and business leaders in the retail sector to explore the role of the board in cyber security. PwC is currently working...

23 June 2017

Montenegro targeted ahead of NATO accession

By Louise Taggart, Threat Intelligence Analyst at PwC It has recently been publicly revealed that the group known as APT 28 or Sofacy targeted the Montenegrin government in the run-up to the country’s accession to NATO, something that has been reported on previously in PwC’s subscription threat intelligence reporting. Lure...

Cloud Hopper Impact: Supply Chain Management & Procurement

By Cathy Brough, Enterprise & Supply Chain Risk Manager at PwC In a rapidly evolving world of threats, Operation Cloud Hopper has highlighted that information security is not only an IT priority, but also an increasing focus area within procurement and supply chain management, with hackers starting to exploit the...

14 June 2017

New world of cyber threats – the dark side of light

By Matt Wixey, ‎Cyber Threat and Vulnerability Management Consultant at PwC Leading the research function in PwC’s Threat and Vulnerability Management team in the UK is an interesting role. In my work I look to identify new cyber threats to organisations, one example of this is by developing proof-of-concept malware...