The Three Lines of Defense model and its challenges

The Three Lines of Defense model and its challenges

In one of our latest blog post, we gave an overview of how the Three-Lines-of-Defense (3LoD) model can be used risk management (The Three Lines of Defense model). This post addresses the challenges of the model and how it can be improved. Criticism and Problems The...
Information Security

Information Security

We live in the digital world, and information technology is an essential part of our health, happiness, and livfes and even has more importance for our business. For example, information security plays a significant role in medical equipment used in hospitals, banking...
The Three Lines of Defense model

The Three Lines of Defense model

As the risk of being targeted by cyberattacks is steadily increasing, prevention and defense against them are mandatory in every organization. The origin of the three lines of defense model as a concept to holistically manage risks lies in the financial...
How to perform efficient Threat Analysis and Risk Assessments

How to perform efficient Threat Analysis and Risk Assessments

Due to digitalization, the number of cyberattacks will inevitably increase worldwide, as the possible attack vectors that a potential hacker can exploit increase proportionally to the increasing connectivity of systems. The consequence of this is that the system needs...