RESILIENCE RESOURCES

Stay ahead of your cyber risk with the latest intel on threats, best practices, and more.

Threatonomics: Trends & Insights from Resilience

News & insights from experts in Cybersecurity, Insurance, and Risk Management. All you need to achieve Cyber Resilience.
View More

The vendors you’re probably missing

While the seven data streams from our previous post will capture the majority of your vendor relationships, they’re primarily designed to find digital services and traditional procurement relationships. Today, we’re exploring the vendor categories that fall through the cracks of most discovery programs, as well as why they often represent some of your highest-risk relationships. […]

How to prepare your organization for a post-quantum world

Quantum computing is on the horizon, and with it comes a seismic shift in how organizations must think about cybersecurity risk. The ability of future quantum machines to break today’s cryptographic protections, what we call quantum decryption, could undermine the trust, confidentiality, and resilience of digital business. This briefing series distills a highly technical topic […]

When will quantum decryption become practical?

As part of Cybersecurity Awareness Month, we’re publishing this three-part series that distills a highly technical topic into strategic insights for leaders. Part 1 explained why quantum decryption poses a threat to current encryption systems. Part 2 lays out credible timelines for when the disruption may arrive. Part 3 will offer practical guidance on how […]

What business leaders need to know about post-quantum cyber risk

Quantum computing is on the horizon and with it comes a seismic shift in how organizations must think about cybersecurity risk. The ability of future quantum machines to break today’s cryptographic protections–what we call quantum decryption–could undermine the trust, confidentiality, and resilience of digital business.                                                                                          As part of Cybersecurity Awareness Month, throughout October we are […]

The false promise of paying criminals to delete your data

On October 6, 2025, hackers demanded ransom from Salesforce for nearly one billion stolen customer records. The company’s response was unequivocal: no payment, no negotiation. While the refusal made headlines, the more important question is why Salesforce—and increasingly, other mature organizations—are walking away from the table when criminals offer to “suppress” stolen data. The answer […]

A CISO’s guide to winning the annual budgeting battle

It’s that time of year again. Finance has sent the email with the budget template attached. Your CFO wants preliminary numbers by next week. And you’re staring at a spreadsheet wondering how to justify the security investments your organization desperately needs when last quarter’s board meeting included the phrase “do more with less.” Welcome to […]

Case Studies

Case Study: Manufacturing

Rapid Response and Strategic Solutions Minimize Disruptions for a Hardware Manufacturer

Read the Case Study
Case Study: Automotive

Improving your security should improve your coverage. 

Read the Case Study
Case Study: Local Gov’t

Focused and targeted incident response and management reduces the impact of an attack 

Read the Case Study

The Building Cyber
Resilience Podcast

Tune-in to learn how a risk-driven approach can help make organizations and enterprises more resilient to cyber threats.
View More
12:12:50 min

Episode #10: Cyber Resilience By Design

Travis Wong, Resilience’s VP of Customer Engagement, and Tas Jalali, Head of Cybersecurity at AC Transit, discuss cyber insurance and business objectives.
Listen and Learn More
Building Cyber Resilience Podcast Episode 9 Featuring Guests Jeanette Manfra and Jeff Greene
19:12 min

Episode #9: Nation-State Cyber Risk’s Impact on the Private Sector

Jeanette Manfra, Director of Risk and Compliance at Google Cloud, and Jeff Greene, Senior Director of Cybersecurity Programs at Aspen Digital, explore creating security in an ever-evolving cyber-landscape, AI, and prioritizing cybersecurity from the foundation.
Listen and Learn More
06:24 min

Episode #8: Exploring Public Cyber Policy and Incentives for the Private Sector

Jacquelyn Schneider, Director of the Hoover Wargaming and Crisis Initiative, and Davis Hake, Co-Founder and Vice President of Policy at Resilience, discuss how private and public sectors influence and implement emerging cyber-security policies.
Listen and Learn More
00:00 min

Episode #7: Will AI replace the underwriter?

Bryce Goodman, Chief Strategist of AI/ML for the US Department of Defense, and Chris Finan, CRO of Symmetry Systems Inc., talk about using AI for cyber attacks and how it affects defensive roles in security.
Listen and Learn More
09:20:02 min

Episode #6: Data Privacy. What is security? What is compliance? What is big brother?

Sheila Jambekar, Chief Privacy Officer at Plaid, and Michael Phillips, Cyber Practice Leader, USA at CFC, discuss the human element at the forefront of security innovations and policies.
Listen and Learn More
01:45:36 min

Episode #5: Data and the DarkWeb. What is it, where is it, and why should we care?

Alison Connolly Halland, DarkOwl’s CBO, and Andrew Bayers, Head of Threat Intel at Resilience, discuss the ways data is collected on the darknet and the tools protecting business information.
Listen and Learn More
01:55:12 min

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Eric Jardine, Cybercrimes Research Lead at Chainalysis Inc., and Victor Fang, Co-Founder and CEO of AnChain.AI, demystify blockchain technology.
Listen and Learn More
06:56:01 min

Episode #3: Threat Hunting In The Cloud for Fun and Profit

Anuj Malkapuram and Anton Chuvakin discuss the role machine learning has in threat management and the skills needed in new cybersecurity hires.
Listen and Learn More
01:13:36 min

Episode #2: Breach Science

Wade Baker and Dave Highlander, the minds behind Verizon’s Data Breach Investigation Report, discuss measuring risk and analyzing cyber breach data.
Listen and Learn More
You can also listen to our podcast on other platforms.

Cyber Resilience starts here.

Request Demo