metrics2trust-1920x1080.jpg

Using security metrics to increase confidence in the third-party ecosystem

There are many widely available tools and techniques to monitor supplier security. Yet many companies struggle to interpret and use their capabilities to refine their own risk profiling process. This is further complicated by the many resources and guidelines¹, compliance standards² and contractual requirements³ that pertain to risk profiling and make the playing field in which risk profiles are adjusted more complex. To ensure appropriate transposition of risk assessment, the PCSI has proposed that companies work together to create generic and user-specific modules with reusable model components under a Creative Commons Licence.

Read more
cybersecurity-and-devops.png

Cybersecurity and DevSecOps to a higher level: how major banks and an insurer collaborate

Banks and insurers are constantly working to lift their security measures to a higher level. Until recently, it was rare for the responsible cyber security specialists to exchange information on the subject. This is a shame, because it is precisely by sharing knowledge and experience that progress can be made, and such exchanges of information are now much more frequent. Thanks to the PCSI, DevSecOps specialists from a number of financial companies have now come together.

Read more
PCSI-Cyber-1200x675.jpg

ABN AMRO to use self-healing software for cybersecurity

ABN AMRO will be the first organisation to use PCSI's 'self-healing security' software in the fight against cyberattacks. This software is capable of autonomously adapting to factors that could disrupt computer systems. The development draws a special parallel with the functioning of the human immune system that has not been applied to companies before.

Read more
security-journey-expert-1200x800.jpg

‘Human actions underexposed in cybersecurity’

Many companies see protection against cybercrime and incidents such as data leaks as a technical issue. But where it often goes wrong is in processes and human actions. A Security Journey Expert will investigate where organisations are vulnerable with respect to human actions. This is what is being proposed by the PCSI.

Read more
DDoS-attack-prediction-1200x675.jpg

Can a DDoS attack be predicted?

In the forecasting of tsunamis, buoys with sensors lie in the ocean, waiting for anomalous behaviour of the waves. The satellite to which the sensors are connected sends the signal to the weather station, after which a warning is issued. Everyone can prepare in time for what is to come. Can a similar prediction be made for DDoS attacks? 

Read more
data classification

New Explore projects are coming up

During the last Ideation sessions in October, new ideas were born and a number of them were selected by the Dragon's Den to be further developed in the upcoming Explore phase of the PCSI. 

Read more
A crystal ball

The first Proof of Concept projects get underway

Recently, the first three PCSI projects reached the end of the Explore phase. During this phase, the project group members of ABN AMRO, Achmea, ING, de Volksbank and TNO actively started investigating possibilities to further shape the innovation ideas and thus prepare them well for the Proof of Concept phase.

Read more
humanbody1-1200x675.jpg

The human immune system: weapon in the fight against cyberattacks

Can we apply the knowledge of the human body's defence mechanism against viruses and bacteria within an ICT infrastructure and thus keep cyber-attacks out? The self-healing security project reveals surprising results.

Read more
Strength in numbers against tomorrow’s cyberattacks

Strength in numbers against tomorrow’s cyberattack

Cyberattacks happen anytime, anywhere. Collaboration is crucial to this: the collective is always stronger than the individual. That's why the PCSI partners join forces in the fight against cybercrime. 

Read more