ASIGEST ADVISOR S.r.l.

 

risk management & financial advisor

 

There is the risk you cannot afford to take, and there is the risk you cannot afford not to take.
Peter Ferdinand Drucker (economist and essayist 1909-2005)

CYBER RISK

 

Cyber security is the second emergency in Europe after Climate Change and immigration.

(source: Jean-Claude Junker Pres. European Commission – September 2017)

 

TYPES OF CYBER THREATS

CYBERCRIME

Generally it has criminal aims, such as, fraud, wire fraud, identity theft, the theft of information, creation of false information, the theft of intellectual property, etc.

ESPIONAGE

Misappropriation of data and sensitive, proprietary or classified information.

WARFARE

Activities planned and conducted with the aim of achieving effects in a military context.

HACKTIVISM

Pursuing social and political objectives through hacking.

TERRORISM & CYBER

SABOTAGE

Cyber attacks committed by an individual or a group through the network or through the secret acquisition of information, to blackmail or jeopardize a government or a company, (SENSITIVE TARGETS), in order to obtain something in return for achieving their criminal pursuits.
The extortion racket in IT, in particular, is a form of cyber terrorism in which a site, email or server is subject to repeated attacks by hackers in order to obtain money.
Cyber extortion is on the rise against companies and private services, who are forced to shell out millions because of the irreparable loss of all their data and IT systems.

 

PRINCIPLES OF ACCOUNTABILITY

  • TAXONOMY: to know the types and risks of the processed data;

  • POLICY: to identify who within the company processes data and how data is processed by creating liability procedures;

  • CRISIS MANAGEMENT: it is necessary to identify the possible defaults and the most suitable solutions for each case.

RISK ASSESSMENT

Whatever the choice, whoever leads the Risk Assessment project, the analysis must be transversal and multidisciplinary.
Relying only on experts.

MULTIDISCIPLINARY TEAM

CYBER RISK
Situation in Italy
For an in-depth analysis we advise you to analyze the reports published by CLUSIT
at the following link:
www.clusit.it