{"id":12,"date":"2023-08-30T02:20:48","date_gmt":"2023-08-30T02:20:48","guid":{"rendered":"http:\/\/improdango.com\/?page_id=12"},"modified":"2023-09-28T20:10:50","modified_gmt":"2023-09-29T03:10:50","slug":"intelligence-buy-in","status":"publish","type":"page","link":"http:\/\/improdango.com\/?page_id=12","title":{"rendered":"Intelligence Buy-In"},"content":{"rendered":"\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<p><a href=\"http:\/\/improdango.com\/?page_id=28\" data-type=\"page\" data-id=\"28\">&#x2196; Diamond Models<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<p><a href=\"http:\/\/improdango.com\/?page_id=266\" data-type=\"page\" data-id=\"266\">Data Sources &#x2197;<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_621637632-1024x682.png\" alt=\"\" class=\"wp-image-178 size-full\" srcset=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_621637632-1024x682.png 1024w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_621637632-300x200.png 300w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_621637632-768x512.png 768w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_621637632.png 1250w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<ul class=\"wp-block-list\">\n<li>According to a Global report by the Carnegie Endowment the threat landscape of attacks to the financial institutions are becoming more frequent, sophisticated, and destructive.<\/li>\n\n\n\n<li>In 2022, the banking industry experienced seventeen major disruptive threats ranging from $1M to $615M in costs.<\/li>\n\n\n\n<li>KPMG ascertains that banks may be ill-equipped to protect customer data, privacy, and assets during a cyberattack&nbsp; based on insight by senior banking executives.<\/li>\n\n\n\n<li>KPMG, Sophos, and CrowdStrike strongly recommend to be proactive:\n<ul class=\"wp-block-list\">\n<li>Include end-point protection with strong anti-exploit capabilities.<\/li>\n\n\n\n<li>Optimize attack preparation creating timely backups and exercise response time.<\/li>\n\n\n\n<li>Implement tools that provide strong visibility to security gaps throughout the enterprise.<\/li>\n\n\n\n<li>Prioritize Cloud Security Protection and education.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator alignwide has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-midnight-gradient-background has-background\"><strong>Adopting AI to mine data, identify critical end points, and respond automatically to cyberattacks will not only reduce downtime but recover costs.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator alignwide has-alpha-channel-opacity is-style-default\"\/>\n\n\n\n<h3 class=\"wp-block-heading alignwide has-text-align-center\" id=\"we-re-a-studio-in-berlin-with-an-international-practice-in-architecture-urban-planning-and-interior-design-we-believe-in-sharing-knowledge-and-promoting-dialogue-to-increase-the-creative-potential-of-collaboration\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.2px) * 1.571), 48px);line-height:1.1\"><em>It is not a matter of IF but WHEN<\/em>.<\/h3>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"780\" src=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_632062543-1-scaled.jpeg\" alt=\"\" class=\"wp-image-179\" srcset=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_632062543-1-scaled.jpeg 2560w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_632062543-1-300x91.jpeg 300w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_632062543-1-1024x312.jpeg 1024w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_632062543-1-768x234.jpeg 768w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_632062543-1-1536x468.jpeg 1536w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_632062543-1-2048x624.jpeg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-right\"><a href=\"http:\/\/improdango.com\/?page_id=266\" data-type=\"page\" data-id=\"266\">Data Sources &#x2197;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#x2196; Diamond Models Data Sources &#x2197; Adopting AI to mine data, identify critical end points, and respond automatically to cyberattacks will not only reduce downtime but recover costs. It is not a matter of IF but WHEN. Data Sources &#x2197;<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":16,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12"}],"version-history":[{"count":7,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":277,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions\/277"}],"up":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/16"}],"wp:attachment":[{"href":"http:\/\/improdango.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}