Materials
2024
2023
A look into the seven popular malware families that have been or continue to be sold as a service on the darknet, and how they are used to attack Russian organizations
A guide to securing company reputation in a cyber incident. We explain how a business impact analysis can help assess cyber risks and protect the brand’s public image
- Why protecting reputation is essential for a successful business
- What cyber incidents can damage brand reputation
- How business impact analysis helps to assess and mitigate reputational damage
- How to handle incidents that jeopardize reputation: guidance and a checklist for the PR department
A research into the impact of leaked ransomware code and builders on the Russian cyber threat landscape: an overview of three most impactful hacker groups—Battle Wolf, Shadow Wolf, and Twelfth Wolf
A report by the International Committee of the Red Cross on the possible digitalization of medical and humanitarian emblems. Compiled in collaboration with BI.ZONE experts.
Physical emblems protect hospitals, transport, mobile camps of medical and humanitarian organizations during armed conflicts. A digital emblem is supposed to protect the digital infrastructure of such institutions. The authors of the paper assess the benefits, risks, and challenges of introducing a digital emblem and describe three potential ways of implementing the project
Physical emblems protect hospitals, transport, mobile camps of medical and humanitarian organizations during armed conflicts. A digital emblem is supposed to protect the digital infrastructure of such institutions. The authors of the paper assess the benefits, risks, and challenges of introducing a digital emblem and describe three potential ways of implementing the project
A look into the tactics, techniques, and procedures of a noticeable hacktivist group, plus recommendations on defense against similar attacks
Practical guidelines on business impact analysis and methods for handling negative scenarios in all situations. Everything you need to know to protect your company from unexpected threats: how to predict risks, monitor critical areas, and insure damages
- Business impact analysis. Preparing your company for adverse events
- Cyber risk management. Identifying the main threats to your company
- Awareness. Mitigating human error in corporate cybersecurity
- Monitoring. Improving resilience to cyberattacks through rapid incident response
- Cyber insurance. Getting the most out of it
2022
A quick guide to understanding business continuity management and the role of cybersecurity
- What is BCM and why you need it
- 7 steps to implement BCM
- Checklist
The annual cybersecurity report prepared by the World Economic Forum with the help of BI.ZONE experts.
The accelerated shift toward remote working and the rise in high-profile cyberattacks are driving the discussions about cyber resilience. The paper outlines the upcoming challenges for digital security leaders in this new landscape.
The annual World Economic Forum Global Risks Report prepared with the assistance from BI.ZONE experts.
The report series tracks global risks perceptions among risk experts and world leaders in business, government, and civil society. It examines risks across 5 categories: economic, environmental, geopolitical, societal, and technological.
The report series tracks global risks perceptions among risk experts and world leaders in business, government, and civil society. It examines risks across 5 categories: economic, environmental, geopolitical, societal, and technological.
2021
World Economic Forum report created with the support of BI.ZONE experts.
This report examines the international cybersecurity certification systems. It also contains expert recommendations based on real case studies and explores the various options for cooperation in this field.
This report examines the international cybersecurity certification systems. It also contains expert recommendations based on real case studies and explores the various options for cooperation in this field.
BI.ZONE experts have produced a guide for building a mature incident response and business continuity system.
This material could be very interesting to IT directors and digital transformation leaders who would benefit from a systematic approach to incident management. Technical experts might discover some new ways of communicating the importance of cybersecurity and its connection to business development when talking to business strategy leaders.
This material could be very interesting to IT directors and digital transformation leaders who would benefit from a systematic approach to incident management. Technical experts might discover some new ways of communicating the importance of cybersecurity and its connection to business development when talking to business strategy leaders.
- Business in the digital age: threats and opportunities
- Managing business continuity through digital transformation
- Incident response: the key to business continuity
The World Economic Forum report contributed by BI.ZONE as a member of a working group for enhancing cyber resilience in the aviation sector.
The experts analyzed the main cyber risks threatening modern aviation, highlighted the obstacles preventing the industry from tackling digital challenges, and offered recommendations for improving cyber resilience at the local, national, and global levels.
The experts analyzed the main cyber risks threatening modern aviation, highlighted the obstacles preventing the industry from tackling digital challenges, and offered recommendations for improving cyber resilience at the local, national, and global levels.
CyberPeace Institute report with the input from BI.ZONE experts.
The report provides a detailed data analysis regarding encryption attacks as well as cases of cyber espionage, extortion, phishing, and other crimes surrounding COVID-19. The experts describe the latest attack techniques, their consequences, and possible motives. The report also covers the challenges behind the implementation of cybersecurity regulations in healthcare.
The report provides a detailed data analysis regarding encryption attacks as well as cases of cyber espionage, extortion, phishing, and other crimes surrounding COVID-19. The experts describe the latest attack techniques, their consequences, and possible motives. The report also covers the challenges behind the implementation of cybersecurity regulations in healthcare.
2020
The Geneva Dialogue report with the support of BI.ZONE experts.
The report compiles best practices for securing the development of digital products and services, recommendations for dealing with vulnerabilities, and guidance for building secure partnerships to avoid falling victim to supply chain attacks.
The report compiles best practices for securing the development of digital products and services, recommendations for dealing with vulnerabilities, and guidance for building secure partnerships to avoid falling victim to supply chain attacks.
A World Economic Forum report with the support of BI.ZONE experts.
Experts delve into the evolution of cyberspace, analyze key systemic risks and challenges in light of increasing technological interconnectedness. The report also examines the impact of artificial intelligence, quantum computing, digital identity, and other technologies on the future of humanity.
Experts delve into the evolution of cyberspace, analyze key systemic risks and challenges in light of increasing technological interconnectedness. The report also examines the impact of artificial intelligence, quantum computing, digital identity, and other technologies on the future of humanity.
A World Economic Forum report prepared with the contribution of BI.ZONE experts as part of the Partnership Against Cybercrime Working Group.
The authors highlight the global challenges and trends of cybercrime and propose steps to build effective cooperation between government and business in the fight against it.
The authors highlight the global challenges and trends of cybercrime and propose steps to build effective cooperation between government and business in the fight against it.
A World Economic Forum report contributed by BI.ZONE experts.
The report offers an analysis of 7 barriers that prevent organizations and nations from effectively sharing data. The practical part of the document describes how AI, ML, encryption technologies, and differential privacy can be used in creating an international data sharing platform.
The report offers an analysis of 7 barriers that prevent organizations and nations from effectively sharing data. The practical part of the document describes how AI, ML, encryption technologies, and differential privacy can be used in creating an international data sharing platform.
The study focuses on the trends in the evolution of digital threats and the issues of ensuring security for organizations—issues which arose as a consequence of the COVID-19 pandemic. Experts compare the security levels of systems in specific industries and make recommendations to increase resistance to the latest cyberthreats
- Infrastructure protection
- Current vulnerabilities
- Trends on the threat landscape
- Cybersecurity across industries
2019
2018
A comprehensive study of device security both from the point of view of hardware and software. The main types of attacks on embedded systems and methods of protection against them
- Main trends
- Attacks on banks
- Attacks on ATMs
- Attacks on bank clients
- Ransomware attacks
- Supply chain attacks
- Phishing and social engineering
- Attacks on Android
- Internet of things, botnets and DDoS
- Data leaks