Demystifying cyber risk for business leaders


Cyber Security Academy



Cyber security: high on your agenda? Ultimate responsibility for cyber security lies with the board. However, it is a highly technical and fast moving global threat, and anyone who isn’t in the IT team can easily feel they lack full understanding of the issues.

Our Cyber Security Academy for business leaders offers a library of videos, articles, podcasts and other content to help non-technical leaders understand the essentials of cyber security and communicate more confidently about this threat. 

Created by our global cyber security team, our insight will be invaluable in reducing the uncertainty around the issue, helping you to protect your company. 

Below is a selection of our most recent cyber content. You can also access our full library of Cyber Security Academy videos on our YouTube channel


Key cyber threat trends play icon

Key cyber threat trends

What primary cyber threats should boards be aware of in 2017/18? 

Watch link icon
Influencing corporate culture play icon

Influencing corporate culture

How can executive boards instil a corporate culture of cyber security across the business?

Watch link icon
Prioritising resources play icon

Prioritising resources

How should senior management prioritise resource when it comes to mitigating cyber security risks?

Watch link icon
Implications of a cyber breach play icon

Implications of a cyber breach

What are the main implications of a cyber security breach that boards need to consider?

Watch link icon
Cyber Due Diligence play icon

Cyber due diligence

What is the potential impact on a merger or acquisition if cyber due diligence isn't done properly.

Watch link icon
CTI Report 2017 so far

Cyber threat landscape report

Who is targeting whom in 2017 and what are this year’s most impactful attack vectors?

Request a demo of our cyber threat intelligence platform or speak to one of our experts.

Our thinking on cyber security 


WannaCry ransomware attack

In this webinar, our cyber experts provide concrete detail on how the WannaCry attacks were mounted and their effect. They draw from Control Risks’ own Cyber Threat Intelligence and from their experience of helping clients deal with both this attack and similar attacks in the past.