top of page
Search


Apples, Pears & Understanding Exposure
Understanding Exposure: Value at risk vs observation & judgement There’s a school of thought that the concept of value at risk or “VaR”...

Steve Dance
Jan 11, 20233 min read


Cyber attack risk - just follow the money
"Follow the money" is a familiar phrase most often associated with identifying the culprits of fraud and financial crime. But it's also a good indicator for other issues - and this context understanding the prevalence and significance of certain kinds of risk. Whatever, your personal experience of insurance companies, their "raison d'etre" is to price and absorb risks - and to make a profit out of that. They make their money by understanding how to price risk - primarily ba

Steve Dance
Sep 7, 20223 min read


Cyber attack recovery: it's never over until it's over
Recovering from a cyber attack can be one of the greatest challenges an organisation can face. Successful attacks can result in ransom demands to decrypt data or to prevent exfiltrated data from being published in the public domain. Whether or not a ransom demand is paid both "denial of data" by encryption or data exfiltration attacks can result in lengthy post-incident handling, recovery and clean-up activities - which can weeks and, in some cases, months. A cyber-attack in

Steve Dance
Aug 3, 20223 min read
bottom of page
