Click here for the Friday Reading Search, a searchable archive of reading and knowledge resources

Since March 2020, Airmic has been issuing Friday Reading, a curated series of readings and knowledge resources sent by email to Airmic members. The objective of Airmic Friday Reading was initially to keep members informed during the Covid-19 pandemic. Today, Airmic Friday Reading has evolved in scope to include content on a wide range of subjects with each email edition following a theme. This page is a searchable archive of all the readings and knowledge resources that have been shared.

To select multiple categories and/or keywords, use Ctrl+Click (or +Click on a Mac).
National Cyber Security Centre (NCSC), 21st June 2024
The NCSC is aware that a cyber criminal group has published data which it claims belongs to Synnovis, a provider of pathology services to the NHS.
Categories:
International Monetary Fund (IMF), 9th April 2024
Greater digitalisation and heightened geopolitical tensions imply that the risk of a cyberattack with systemic consequences has risen.
Categories:
McKinsey & Co, 20th March 2024
With digitisation, computing, and advanced technologies, the “attack surface” is now the sum of systems and capabilities that can be exploited by cyberattackers.
Categories:
Baker Tilly, 19th February 2024
The cybersecurity landscape is always evolving. To mitigate risk, you must understand your organisation’s unique vulnerabilities, cybersecurity processes and controls.
Categories:
Allianz, 1st January 2024
Cyber incidents such as ransomware attacks, data breaches, and IT disruptions, rank as the top global risk in the Allianz Risk Barometer – and by a clear margin for the first time. What are the main trends set to drive cyber activity in 2024?
Categories:
AXA XL, 30th October 2023
As risk managers grapple with the evolving cyber risk landscape, cyber insurance is a valuable component of cyber security efforts. Retaining some cyber risk in a captive, or exploring structured risk solutions, can play an important part in an overall cyber risk management strategy.
Categories: