Security Vetting for UHNW Individuals and Their Staff
For UHNW individuals, trusted staff and thorough security vetting are essential to protect privacy and sensitive aspects of daily life.
In 2022 BGS provided an overarching security programme for one of the wealthiest and most high-profile families in the Middle East.
For UHNW individuals, trusted staff and thorough security vetting are essential to protect privacy and sensitive aspects of daily life.
Whistleblowing is driven by a reasonable belief that serious issue such as a crime or a cover-up of malpractice is happening or likely to happen, and that exposing it serves the public interest.
Before building effective defences against insider risks and threats, organisations must understand why some employees are susceptible – as Nietzsche pithily put it ‘[w]hen you know your ‘why,’ you can endure any ‘how.’’
Travel risk management: Guidance for organisations provides that training of travellers in respect ‘Personal and proprietary information protection, risk of social engineering and espionage need[s] to be provided…’
Effective insider risk management requires a coordinated and integrated approach that combines technical, HR and physical measures to address new risks. All too often staff in one functional area fail to appreciate the risks and importance of action in other domains.
Ellen Davies our Lead Open-Source Investigator answers the question, in her opinion: Does Open-Source Research and Cyber Security Research collaborate as a team?
Ellen Davies our Lead Open-Source Investigator discusses how Open-Source Research can help in identifying potential phishing campaigns.
Ellen Davies our Lead Open-Source Investigator discusses the role Open-Source Research plays in tracking cyber threat actors.
Ellen Davies our Lead Open-Source Investigator discusses how Open-Source Research can aid in identifying software vulnerabilities?
Ellen Davies our Lead Open-Source Investigator discusses how Open-Source Research can identify exposed credentials?
Ellen Davies discusses how Open-Source Research can help in assessing the cybersecurity posture of suppliers?
As a non-executive board member, is your role as a guardian of governance keeping pace with the contemporary challenges to the lawful, ethical, and successful management of organisations?