Cyber Security Practitioner

Volume: 2 Issue: 12
(December 2016)


Following the cyber attack on Tesco Bank in November 2016, it has been alleged that use of sequential card numbers on Tesco Bank’s debit cards might have left users more vulnerable to the attack, according to a Financial Times report on 11 December 2016. / read more

The European Union Agency for Network and Information Security (‘ENISA’) published an updated version of its National Cyber Security Strategy Good Practice Guide (‘the Guide’) on 14 November 2016, which includes a proposed National Cyber Security Strategy (‘NCSS’) lifecycle. / read more


As I was putting the final touches to this month’s editorial, which was going to be about the ICO’s most recent data breach statistics, the news of the latest Yahoo hack broke, just as I was about to press send and go to bed. / read more

Recent short seller collaborations with security researchers demonstrate a new trend in the evolving short seller strategy of publishing harmful information about a company and profiting from the drop in stock price. This new trend involves a public disclosure of information about a material cyber security vulnerability in a target company’s products or IT systems. This disclosure of information often results in an immediate drop in the target company’s stock price. Short sellers stand to gain millions from these efforts in a matter of minutes with potentially lasting financial impact on targeted companies. Todd S. McClelland and Frances P. Forte of Jones Day explore the implications of this trend, and discuss mitigation approaches for those businesses that could be affected by such strategies. / read more

On 1 November 2016, the UK Chancellor of the Exchequer launched the National Cyber Security Strategy (the ‘Strategy’) which sets out the UK Government’s plan to make the UK confident, capable and resilient in the digital world. Here, Hans Allnutt, Partner at DAC Beachcroft and member of the Cyber Security Practitioner Editorial Board, evaluates the Strategy and the key objectives contained within. / read more

On 25 May 2018 the General Data Protection Regulation (‘GDPR’) will enter into force, replacing the European Data Protection Directive. David Cook, Solicitor in PwC’s cyber security and data protection legal team, considers how the landscape surrounding this area has evolved, focusing in particular on breach notification. / read more

As cyber risk poses a growing threat across industry, the UK’s Prudential Regulation Authority (‘PRA’) has produced a Consultation Paper (‘Paper’) setting out its expectations for managing cyber underwriting risk. Here, Manoj Vaghela and Ahmed Bobat, Partner and Trainee Solicitor respectively at Pinsent Masons LLP, evaluate the scope of the Paper and what response, if any, it has drawn from the insurance sector. / read more

Recognising the risks to banking entities and their service providers from technology failures and cyber hacks and the need to enforce national standards to protect critical banking services, in October 2016 the Board of Governors of the US Federal Reserve System, the Office of Comptroller of the Currency (‘OCC’), and the Federal Deposit Insurance Corporation (‘banking agencies’) issued a ‘Joint advance notice of proposed rulemaking’ seeking comment on certain proposals relating to enhanced cyber risk management standards (‘Advance NPRM’). Michelle W. Cohen of Ifrah PLLC discusses the Advance NPRM. / read more

About Cyber Security Practitioner:

Cyber Security Practitioner, the most recently launched monthly publication from Cecile Park Media, provides a multi-disciplinary view on the cyber security challenges facing global businesses and delivers insight into operational change. It covers cyber security regulation, data breach, data security, cyber risk, cyber crime, ethical hacking, privacy and data protection, cyber infrastructure, technical solutions, risk management, information assurance, security standards, liability, consumer protection, ransomware and other cyber threats, cyber insurance... /read more

Search Publication Archives

Our publication archives contain all of our articles.
Can’t find what you are looking for?
Try an Advanced Search

Log in to cyber security practitioner
Subscribe to cyber security practitioner
Register for a Free Trial to cyber security practitioner
cyber security practitioner Pricing

Social Media

Follow cyber security practitioner on TwitterView cyber security practitioner LinkedIn Profilecyber security practitioner RSS Feed