Remove category security-breach
article thumbnail

Cyber Blackmail: More Than Just Ransomware

The Texas Record

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. The first category is a new twist on an old criminals’ favorite: blackmail-based extortion. 1] Diamant, A.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Srivastav 2014, p 18). Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans.