Articles & Interviews

Software supply chain attacks are not new, but increased attacker sophistication combined with modern software development and cloud delivery exposed latent inherent risks that caught many businesses off guard. In this webinar, IANS Faculty member Earl Crane covers how to analyze and manage software supply chain risks.

The modern, digital economy is more interconnected than ever before, and companies today rely on a network of partners and third parties to efficiently deliver their services. But the expanded role of third parties also exposes them to additional cyber risk. In a recent RANE webinar, Dr. Crane and other experts examined best practices for creating a dynamic cyber risk management strategy to help actively manage the endpoints in the vendor supply chain.

The regular discovery of an increasing number of security vulnerabilities paints a dire picture in which cybersecurity budgets grow indefinitely to deal with an environment where malware and malicious actors always have the upper hand. We spoke to Dr. Earl Crane, a cybersecurity consultant and former Director for Cybersecurity Policy for the White House National Security Council, to help evaluate the actual size of the threat facing companies today.

Video interview with David Eades of the BBC at ThinkSport TheSPOT event May 15, 2018 in Lausanne, Switzerland. How digitization, evolving threats, and passion combine to create a unique set of risks for today’s sports enterprises.

May 15, 2018

RANE expert and Emergent Network Defense (END) CEO Dr. Earl Crane, who was former Director of Federal Cybersecurity Policy at the White House, commented on major aspects of the plan that stand out.

Enterprise adoption of IoT devices – including commercial and government – will account for almost 80% of IoT adoption, creating one of the largest attack surfaces for your enterprise and an intrusion vector possibly eclipsing phishing email as a top risk exposure.

December 23, 2016

Emergynt Thinking

Cyber Risk Appetite: Are you Hungry? — Part One

Jun 14, 2016 · 4 min read

Cyber Risk Appetite: Are you Hungry? — Part Two

Jul 8, 2016 · 5 min read

Cyber Risk Appetite: Are you Hungry? — Part Three

Jul 29, 2016 · 5 min read