This edition of Road to Next explores the wave of investment and innovation at the intersection of food and technology.
...USDC CASE HARBORVIEW CAPITAL vs. CROSS RIVER BANK
Defrauded $1.375 million by a hacker, Harborview now attempts to shift its losses to Cross River.
...The Future of the Internet
Read the new Declaration for the Future of the Internet.
...NIST SPECIAL PUBLICATION 800-171r2
The protection of Controlled Unclassified Information (CUI) in nonfederal systems and organizations is of paramount importance to federal agencies to conduct its essential missions and functions successfully.
...NIST SPECIAL PUBLICATION 800-40r4
The continuous search and exploitation of flaws in software are why maintenance is critical.
...Joint Cybersecurity Advisory – TraderTraitor
Cyber actors target various blockchain technology and cryptocurrency industry organizations.
...Capital Cost Post Data Breach
Your free cash flow will likely not absorb all expenditures during the recovery process. Does the future cost of disruption warrant a pause for consideration?
...Finance Leaders Priorities in 2022
CFOs continue to grapple with how to turn investments for both the enterprise and finance function into digital wins for the organization.
...NIST Special Publication 800-172A
The protection of Controlled Unclassified Information (CUI) in nonfederal systems and organizations is essential to federal agencies and can directly impact the ability of the Federal Government to carry out its assigned missions and business operations successfully.
...Public Company Cybersecurity
Read the SEC’s proposed amendments to enhance and standardize public companies’ disclosures regarding cybersecurity.
...Ohio Manufacturing Counts 2022
Manufacturing is the largest of the twenty Ohio economic sectors, and the sector GDP in 2020 was $105.3 billion. After California, Texas, and Illinois, this financial contribution ranked fourth in the nation.
...Middle Market Indicator Year-End 2021
Review this business performance update and economic outlook survey conducted among 1,000 C-Suite executives of companies with annual revenues between $10M and $1B.
...Top 100 Accounting Firms
The findings result from approximately 300 tax and accounting firms throughout the U.S. and rank the top 100.
...Joint Cybersecurity Advisory – Conti Ransomware
Ransomware-as-a-service (RaaS) variants, such as Conti, require that you implement mitigation measures before criminals exploit your weaknesses.
...When Later Becomes Too Late
Forward-looking executives and technical teams conduct practical strategy discussions to account for workflow disruptions and the corresponding impacts to revenue, expenses, and equity.
...CFO Budget Preparation
Does your CEO enjoy surprises? Making sure the pieces fit includes accounting for risk and expense. After reviewing this use case, do you agree?
...CFO Compensation Survey 2022
The CFO Compensation Survey provides a window into the compensation practices and services that affect the office of the CFO in venture-backed and mid-market growth companies. The survey is in response to and in coordination with the members of the CFO Roundtable.
...WEF The Global Risks Report 2022
The WEF 2022 Global Risks Report identifies tensions that will result from diverging trajectories and approaches within and between countries and then examines the risks that could arise from such stresses. This year’s report also highlights the implications of these risks for individuals, governments, and businesses.
...NIST IR 8389 Draft Cybersecurity Considerations for OBT
Open banking refers to a new financial ecosystem governed by specific security profiles, application interfaces, and guidelines to improve customer choices and experiences.
...DoD Competition Report within the DIB February 2022
Competition within the DIB is vital to the Department for several reasons. When markets are competitive, the Department reaps the benefits through improved cost, schedule, and performance for the products and services needed to support national defense. This document is available for viewing or download.
...Experian 2022 Data Breach Forecast
This ninth edition forecast discusses supply chains, online gambling, remote workers, digital assets, and infrastructure. Read Experian’s predictions and takeaways.
...Dun & Bradstreet FTC Complaint
The Federal Trade Commission charges that Dun & Bradstreet (D&B) engaged in deceptive and unfair practices. From at least May 2015, D&B advertised, marketed, offered for sale, sold, and distributed products to small and mid-sized businesses. For more information, see the complaint.
...Merck Summary Judgment for Ransomware Losses
The New Jersey Superior Court granted partial summary judgment in favor of Merck and International Indemnity, declaring that the War or Hostile Acts exclusion was inapplicable to the dispute from the 2017 Notpetya cyber attack by the Russian government.
...United Structures Ransomware Bankruptcy
A ransomware attack in 2019 caused a $100M Texas-based steel structure manufacturer to file for bankruptcy in 2022. The Company purportedly paid the requested ransom, but its data was not recoverable. Read the Chapter 11 bankruptcy declaration.
...Measuring Asset Risk
A lack of understanding and misplaced assumptions often rob construction industry executives of sleep and profits. You will not successfully deliver construction projects without managing timelines, budgets, quality, and asset risk.
...Remeasuring Cyber Risk
Profitable manufacturing businesses need to limit information insecurity to remain viable. Company processes depend on protected data, and workflow disruptions that threaten assets can result in customer dissatisfaction. When leaders fail to fund and address information insecurity, the results can be costly and long-lasting. Reach consensus on securing critical assets and workflows before allocating resources. […]
...Executive Delegation
As manufacturers continue to expand their operational capabilities, managing MSPs has become a source of great anxiety and business disruption. Companies that fail to validate the security protections offered by MSPs and IT vendors are often ill-equipped to respond to sudden cyber attacks and other threats.
...Executive Clarity
During periods of more significant uncertainty, clarity is cherished because it provides confidence. Leaders desire clarity to avoid confusion, maintain credibility, and support well-informed decision-making. You can gain clarity and confidence to prevent business disruptions. DownloadView
...Minimizing Disruption
The manufacturing industry is one of the pillars of the U.S. economy, meaning supply chain disruptions often have a rippling effect on other businesses, vendors, suppliers and third parties. COVID-19 is just one example of how global crises and uncertainty can directly impact manufacturing operations from end to end, which is why companies should focus on supply chain risk planning. Learn more about the current manufacturing landscape and how Certitude Security can help your firm develop a security strategy to minimize downtime and financial loss.
...Business Disruption and Financial Consequences
The coronavirus pandemic has been a wake-up call for the manufacturing industry, leading many firms to consider reshoring their operations to the U.S. and sourcing from domestic suppliers. This moment in history represents both a major risk and an opportunity for manufacturers to future-proof their operations and build in more robust cybersecurity protections. Discover how Certitude Security can help your company maximize visibility of its IT systems and take true control over your production environment.
...Executive 3rd Party Risk
Modern businesses rely on a patchwork of third-party vendors, suppliers and partners to deliver quality products and keep supply chains running efficiently. However, without third‐party risk monitoring and escalation processes, business leaders can struggle to keep track of third-party commitments and their ongoing performance.
...Executive Security Strategy
The manufacturing industry is in the midst of a major transformation, where automation and data analytics are the rule rather than the exception. But as more systems and applications are deployed, business leaders must develop clearly defined strategies to monitor, communicate and manage cyber risks.
...Executive Loss Control
Protecting the security and privacy of business data has become a necessity for organizations that rely on digital technologies and cutting-edge applications. Discover how Certitude Security can help combat data loss, prolonged system downtime and other cyber risks that threaten your business continuity.
...Executive Business Continuity
Manufacturing firms of all sizes prioritize business continuity to ensure their operations are disaster-resistant, their systems are protected against cyber threats and their data is secured. Learn how Certitude Security can help your organization leverage proactive backups, disaster recovery strategies and data loss prevention techniques to reduce unplanned downtime and costly disruptions.
...Executive Financial Loss
After an unexpected ransomware attack, a small Midwest manufacturing firm discovered its third-party IT vendor couldn’t deliver the protection or support it promised. Learn how the organization bounced back and what steps it’s taking to prepare for future cyber threats.
...Technical Business Continuity
Between data loss, ransomware and unplanned downtime, manufacturing firms have a wide range of operational challenges that threaten the continuity and reliability of their IT systems. Learn how robust disaster recovery and data backup processes can help mitigate business disruptions and set your organization up for long-term success.
...Rise in Data Loss Caused by Ransomware Attacks Due to Work from Home
This video shows a simulation of a hacker that was able to steal files containing sensitive information and then using ransomware to cover their tracks, after compromising the system through RDP that was accessible through the Internet. In cases such as this, ransomware can impact not only the infected machine, but other systems that support […]
...Manufacturing Executive Anxiety: Cyber Risk Explained
Recent history continues to prove that no industry is immune to cyberattacks. Insufficient protection against cyber threats can result in numerous adverse outcomes. As manufacturers direct resources to address affected aspects of their operations, other business areas are neglected that require ongoing maintenance.
...Manufacturing Insights: Cyber Risk Expectations Versus Reality
Meeting budget requires the consistent production of quality products, shipped accurately, and delivered on time. The order intake and orders invoiced are vital oxygen. Simultaneously, cybercrime organizations are planning to separate you from your capital, your reputation, and your customers. If they can make you beg, they know you will give them more money. Viable manufacturers are taking proactive measures to understand these cyber threats and coordinate effective countermeasures to avoid probable loss events.
...Is your robot vacuum cleaner spying on you?
News Anchor and Reporter for ABC 6, Maria Durant, discussed data privacy concerns with Certitude Security CEO, Lowell Bowdle. “Nothing is private anymore, ” Bowdle said. “With Wi-Fi enabled autonomous robots and the HOME application on your smartphone, the robot is not only creating a map of your home, but it’s also sharing data back […]
...Lowell Bowdle, CEO of Certitude Security, provided comment about keeping kids safe from online predators
ABC 6 Reporter Lu Ann Stoia questions parents, Would you know if creepers are interacting with your children? Bowdle said it’s important for parents to talk with children about their social media and set boundaries around appropriate content. “At the moment the video starts playing, it can be innocent and fun, but it can turn […]
...Voter identity, ballot accuracy and privacy become increasing concerns as polling options go online.
Frank LaRose, Ohio Secretary of State, stated “every piece of electronic equipment ever built is hackable, period.” ABC 6 Senior Political Reporter Ben Garbarek visits with Certitude Security CEO Lowell Bowdle to discuss online voting concerns. “Your mobile device is not safe and that’s a concern,” said Lowell Bowdle. “Even if we’re doing facial recognition, […]
...Social Media Threats
ABC 6 News Anchor and Reporter, Rodney Dunigan, highlights hate being spread on social media. Lowell Bowdle, CEO of Certitude Security, provided comment in advance of the September 18th Senate Commerce Committee hearing on Mass Violence, Extremism, and Digital Responsibility. “These social platforms own the data. Unfortunately, in most cases, the signs are caught too […]
...Manufacturing Cybersecurity: What CFOs Need to Know
The mindset and engagement of executive leadership, and specifically the CFO, to set a culture of security, further enables that organization to take steps to notify and educate all employees of their role in preventing cyberattacks. In the absence of controls, reporting, and enforcement measures, CFOs rely on hope to address their concerns.
...Government Targeting Social Media To Save Lives
ABC 6 Anchor and Reporter, Rodney Dunigan, shares details of the federal and state governments’ efforts to reduce gun violence through social media monitoring. Mr. Dunigan speaks with Lowell Bowdle, CEO of Certitude Security, about how social media data is being analyzed.
...Pelotonia Funds Life Saving Cancer Research
Fox28 Meteorologist Phil Kelly’s interview at Broadcast Lake with Lowell Bowdle, CEO of Certitude Security, highlights the impact that Pelotonia funded research has on our future. “If we all contributed a little more each year to fund cancer research, we would probably find a cure years sooner and save millions of lives.”
...Standards and Controls Needed for Ballot Box Security Video
ABC 6 Reporter, Ben Garbarek, sits down with Certitude Security CEO Lowell Bowdle to discuss ballot box security. “Without the controls and standards in place, without that visibility, it is really impossible to protect that voter information.”
...