<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>osmond-lead</title>
    <link>https://www.osmond.ch</link>
    <description />
    <atom:link href="https://www.osmond.ch/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Cyberbytes Issue 6/25: Cyber Insurance – Mandatory or Optional?</title>
      <link>https://www.osmond.ch/cyberbytes-issue-6-25-cyber-insurance-mandatory-or-optional</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber Insurance: The Next Seatbelt for Digital Risk?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In 1666 the Great Fire of London turned fire insurance from a novel experiment into a cornerstone of urban risk management. It demonstrated that collective preparedness and pooled risk are essential to societal resilience. Today, the relentless surge of cyberattacks poses a similar challenge in the digital realm, forcing policy-makers and organisations to rethink how they manage cyber threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As economic losses mount, the debate over whether cyber insurance should become mandatory is intensifying across policy, legal, and risk management circles. Are we approaching a tipping point where cyber insurance shifts from a niche product to a standard, and potentially mandatory, safeguard in our digital age?
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Podcast zum Artikel auf Deutsch: Cyber-Versicherung - Unterschiedliche Perspektiven
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           (AI NARRATED)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Podcast on the article in English: Cyberinsurance - The Great Debate
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           (AI NARRATED)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+Cyberinsurance.png" length="701122" type="image/png" />
      <pubDate>Mon, 29 Sep 2025 16:16:31 GMT</pubDate>
      <guid>https://www.osmond.ch/cyberbytes-issue-6-25-cyber-insurance-mandatory-or-optional</guid>
      <g-custom:tags type="string">#CyberResilience,#RiskManagement,#Datenschutz,#Digitalisierung,#Meldepflicht,#ISG2025,#Informationssicherheit,#KritischeInfrastrukturen,#ITCompliance,#CyberSecurity,#ITSecurity,#ITDienstleister,#Sicherheitsgesetz</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+Cyberinsurance.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+Cyberinsurance.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyberbytes Issue 4/25: Ransomware - To Ban or Not to Ban?</title>
      <link>https://www.osmond.ch/cyberbytes-issue-4-25-to-ban-or-not-to-ban-the-ransomware-payment-debate</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Ransomware Riddle: Should Paying Be a Crime?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As ransomware attacks escalate globally, governments are grappling with a critical question: Should paying ransoms be legally banned? This issue dives into the complex debate surrounding proposed bans - especially targeting public sector and critical infrastructure organizations. With countries like the UK, US, and Australia exploring or implementing restrictions, the conversation spans ethical dilemmas, national security concerns, and operational realities.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             ﻿
            &#xD;
        &lt;/span&gt;&#xD;
        
            Would outlawing payments disrupt the cybercrime economy, or risk punishing victims and jeopardizing essential services?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This blog explores the who, what, when, and why behind one of cybersecurity’s most pressing policy debates.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+Ransomware-81337c64.png" length="629369" type="image/png" />
      <pubDate>Thu, 31 Jul 2025 13:20:46 GMT</pubDate>
      <guid>https://www.osmond.ch/cyberbytes-issue-4-25-to-ban-or-not-to-ban-the-ransomware-payment-debate</guid>
      <g-custom:tags type="string">#CyberResilience,#RiskManagement,#Datenschutz,#Digitalisierung,#Meldepflicht,#ISG2025,#Informationssicherheit,#KritischeInfrastrukturen,#ITCompliance,#CyberSecurity,#ITSecurity,#ITDienstleister,#Sicherheitsgesetz</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+Ransomware-81337c64.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+Ransomware-81337c64.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyberbytes Issue 3/25: NIS 2 Directive - Update on development</title>
      <link>https://www.osmond.ch/cyberbytes-ausgabe-3-25-nis-2-directive-directive-eu-2022-2555</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What does NIS 2 mean for companies in the EU and Switzerland? So, where do we stand today?
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The new EU NIS 2 Directive introduces significantly stricter cybersecurity requirements for medium-sized and large companies in critical and important sectors. It expands the scope, tightens reporting requirements and introduces clear control mechanisms. Swiss companies are also affected – either directly through harmonised national laws or indirectly through their EU business relationships.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This article provides a concise and practical overview of
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           who
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           what
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           when
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           why
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            behind
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
      
           NIS 2.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+NIS2.png" length="672974" type="image/png" />
      <pubDate>Thu, 31 Jul 2025 12:49:10 GMT</pubDate>
      <guid>https://www.osmond.ch/cyberbytes-ausgabe-3-25-nis-2-directive-directive-eu-2022-2555</guid>
      <g-custom:tags type="string">#CyberResilience,#RiskManagement,#Datenschutz,#Digitalisierung,#Meldepflicht,#ISG2025,#Informationssicherheit,#KritischeInfrastrukturen,#ITCompliance,#CyberSecurity,#ITSecurity,#ITDienstleister,#Sicherheitsgesetz</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+NIS2.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+NIS2.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyberbytes Ausgabe 2/25: Informationssicherheitsgesetz (ISG), Teil 2 - aktueller Stand Mai 2025</title>
      <link>https://www.osmond.ch/cyberbytes-issue-2-25-informationssicherheitsgesetz</link>
      <description>ISG 2025: Neue Pflichten für Betreiber kritischer Infrastrukturen und IT-Dienstleister

Das neue Informationssicherheitsgesetz (ISG) betrifft ab 2025 nicht nur Bundesbehörden, sondern auch kritische Infrastrukturen (z. B. Energie, Wasser, Gesundheit, Verkehr) sowie IT-Dienstleister mit Bundesaufträgen. Ziel ist es, die Cybersicherheit in der Schweiz zu stärken und einheitliche Standards für den Schutz sensibler Informationen zu schaffen.

Wichtige Änderungen:

Meldepflicht für Cyberangriffe: Ab dem 1. April 2025 müssen Vorfälle innerhalb von 24 Stunden an das Bundesamt für Cybersicherheit (BACS) gemeldet werden.
Verpflichtung zum Risikomanagement und Aufbau eines Informationssicherheits-Managementsystems (ISMS).
Vertragliche Absicherung: Auch Dritte, die mit betroffenen Organisationen zusammenarbeiten, müssen Sicherheitsanforderungen erfüllen.
Warum jetzt handeln?
Unternehmen sollten sich frühzeitig vorbereiten, um rechtzeitig compliant zu sein und Sanktionen zu vermeiden.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ISG 2025: Das Cybergesetz, das Ihr Unternehmen härter treffen könnte, als Sie denken
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Das neue 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Informationssicherheitsgesetz (ISG)
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             ist kein trockenes Behördenpapier – es betrifft direkt jene, die das Rückgrat unserer digitalen Infrastruktur bilden.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ob 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Betreiber kritischer Infrastrukturen
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            wie Energie, Wasser, Verkehr oder Gesundheit, 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            IT-Dienstleister mit Bundesaufträgen
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           oder 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Organisationen mit sensiblen Systemen
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            :
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Für sie alle bringt das ISG 2025 klare Pflichten, neue Meldefristen – und echte Konsequenzen bei Verstössen.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Was genau ändert sich? Wer ist betroffen? Und warum ist jetzt der richtige Zeitpunkt, sich vorzubereiten?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            In diesem Beitrag liefern wir die Antworten.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+f%C3%BCr+cyberytes+2-25+cyberunity.png" length="1106388" type="image/png" />
      <pubDate>Thu, 12 Jun 2025 08:14:42 GMT</pubDate>
      <guid>https://www.osmond.ch/cyberbytes-issue-2-25-informationssicherheitsgesetz</guid>
      <g-custom:tags type="string">#CyberResilience,#RiskManagement,#Datenschutz,#Digitalisierung,#Meldepflicht,#ISG2025,#Informationssicherheit,#KritischeInfrastrukturen,#ITCompliance,#CyberSecurity,#ITSecurity,#ITDienstleister,#Sicherheitsgesetz</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+f%C3%BCr+cyberytes+2-25+cyberunity.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+f%C3%BCr+cyberytes+2-25+cyberunity.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyberbytes issue 1/25: Cyber Secure, Credit Sure - Digital Defenses as the New Credit Score</title>
      <link>https://www.osmond.ch/cyberbytes-issue-1-25-cyber-secure-credit-sure-digital-defenses-as-the-new-credit-score</link>
      <description>Explore how cybersecurity is becoming a key factor in credit assessments learn why digital resilience now influences business credit scores and what it means for your financial future.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why Cybersecurity Is the New Credit Score
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today’s digital economy, cybersecurity isn’t just about protecting data—it’s becoming an important factor in determining creditworthiness. In this issue of CyberBytes, we explore how financial institutions are increasingly factoring cyber risk into credit assessments, what this means for businesses of all sizes, and why cyber resilience could soon be as important as your balance sheet. Whether you're a startup or a multinational, understanding this shift could be critical to securing your next loan.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+f%C3%BCr+Cyberbites+I-25-38e462d9.png" length="924647" type="image/png" />
      <pubDate>Wed, 14 May 2025 09:47:08 GMT</pubDate>
      <guid>https://www.osmond.ch/cyberbytes-issue-1-25-cyber-secure-credit-sure-digital-defenses-as-the-new-credit-score</guid>
      <g-custom:tags type="string">#Cybersecurity,#CyberResilience,#RiskManagement,#DigitalSecurity,#FinancialInstitutions,#DigitalTransformation,#CreditScore,#CreditRisk,#DataProtection,#CyberThreats,#BusinessFinance,#SMEs</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+f%C3%BCr+Cyberbites+I-25-38e462d9.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Bild+f%C3%BCr+Cyberbites+I-25-38e462d9.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Operational Resilience and Business Continuity Management</title>
      <link>https://www.osmond.ch/operational-resilience-and-business-continuity-management-complementary-and-interdependent-but-not-interchangeable</link>
      <description>Explore how Business Continuity Management (BCM) and Operational Resilience work together to strengthen organizational stability, complementary, interdependent, but not interchangeable</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Complementary and Interdependent but not Interchangeable
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today’s cyber jungle, where cloud-based architectures, bad actors, phishing scams, and zero-day exploits run rampant, businesses of all sizes find themselves treading an increasingly perilous path around ever more numerous pitfalls. Enter Operational Resilience (OR) and Business Continuity Management (BCM), two key aspects of robust business operations essential for steering companies through the digital minefield.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Understanding these two concepts in relation to one another, especially the distinctions between the two and how they complement each another, is crucial for fortifying companies against the perils of the digital world.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/OR-vs-BCM-Artikel-Bild.jpg" length="331418" type="image/jpeg" />
      <pubDate>Tue, 02 Jul 2024 06:35:26 GMT</pubDate>
      <guid>https://www.osmond.ch/operational-resilience-and-business-continuity-management-complementary-and-interdependent-but-not-interchangeable</guid>
      <g-custom:tags type="string">#RiskManagement,#BusinessStability,#DisasterRecovery,#BusinessContinuity,#ContinuityPlanning,#OrganizationalResilience,#CrisisManagement,#BCM,#OperationalResilience,#ResilienceStrategy</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/OR-vs-BCM-Artikel-Bild.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/OR-vs-BCM-Artikel-Bild.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyberbytes issue 3/24: Artificial Intelligence (AI) Act, 2024 (EU)</title>
      <link>https://www.osmond.ch/cyberbytes-issue-3-24-the-who-what-when-and-why-artificial-intelligence-ai-act-2024-eu</link>
      <description>Discover what the EU AI Act 2024 means for businesses, developers, and users across Europe. In CyberBytes 3/24, we break down the who, what, when, and why of this landmark legislation shaping the future of artificial intelligence.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What is behind the EU AI Act 2024? Cyberbytes 3/24 provides a concise overview.
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The EU Artificial Intelligence Act is a comprehensive legal framework that aims to protect fundamental rights while promoting innovation by classifying AI systems according to their level of risk, banning certain types of AI, and imposing obligations on providers and users of high-risk AI systems.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/EU-AI-Acts-Cyberbyte.jpg" length="666176" type="image/jpeg" />
      <pubDate>Fri, 26 Apr 2024 06:24:24 GMT</pubDate>
      <guid>https://www.osmond.ch/cyberbytes-issue-3-24-the-who-what-when-and-why-artificial-intelligence-ai-act-2024-eu</guid>
      <g-custom:tags type="string">#DigitalRegulation,#EUAIAct2024,#CyberBytes,#ResponsibleAI,#TechPolicy,#AIAct,#AIRegulation,#AIinEurope,#ArtificialIntelligence,#AICompliance</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/EU-AI-Acts-Cyberbyte.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/EU-AI-Acts-Cyberbyte.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyberbytes issue 2/24: Federal Act on Information Security in the Confederation (FAISC) / Informationssicherheitsgesetz (ISG), 2024 (CH)</title>
      <link>https://www.osmond.ch/cyberbytes-issue-2-24-the-who-what-when-and-why-federal-act-on-information-security-in-the-confederation-faisc-informationssicherheitsgesetz-isg-2024-ch-27-03-2024-icon-reading-time-wh</link>
      <description>Switzerland’s FAISC (ISG 2024) sets new standards for federal cybersecurity. In CyberBytes 2/24, explore who’s impacted, what’s required, and how this law reshapes digital risk management across public and private sectors.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Focus on the new Swiss Security Act: Cyberbytes 2/24 explains what the Federal Act on Information Security (FAISC / ISG) means for Switzerland.
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Federal Act on Information Security in the Confederation (FISIC), which came into force on 1 January 2024, aims to ensure the secure processing of information and the safe use of IT resources by federal and cantonal authorities, private-law companies that support the Confederation and operators of critical infrastructure. In addition, an amendment introduced a reporting obligation for cyber attacks on critical infrastructure, which is expected to come into force on 1 January 2025.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Cyberbytes-Issue-3-ISG-Banner-6a4a4375.jpg" length="70492" type="image/jpeg" />
      <pubDate>Wed, 27 Mar 2024 13:51:46 GMT</pubDate>
      <guid>https://www.osmond.ch/cyberbytes-issue-2-24-the-who-what-when-and-why-federal-act-on-information-security-in-the-confederation-faisc-informationssicherheitsgesetz-isg-2024-ch-27-03-2024-icon-reading-time-wh</guid>
      <g-custom:tags type="string">#CyberBytes,#PublicSectorSecurity,#FAISC2024,#Switzerland,#ISG2024,#CybersecurityLaw,#InformationSecurity,#DigitalCompliance</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Cyberbytes-Issue-3-ISG-Banner-6a4a4375.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Cyberbytes-Issue-3-ISG-Banner-6a4a4375.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyberbytes 1/24: DORA 2024 - What the EU’s Digital Resilience Law Means</title>
      <link>https://www.osmond.ch/cyberbytes-issue-1-24-the-who-what-when-and-why-digital-operational-resilience-act</link>
      <description>The EU’s Digital Operational Resilience Act (DORA) is reshaping how financial entities manage cyber risk. In CyberBytes 1/24, we break down who’s affected, what’s required, and how to prepare for compliance in 2024 and beyond.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DORA Demystified: Cyberbytes 1/24 explains the EU’s Digital Operational Resilience Act and its impact on financial entities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Digital Operational Resilience Act (DORA) is a European Union regulation that came into force on 16 January 2023 and will apply from 17 January 20251. Its main objective is to improve the IT security of financial institutions, including banks, insurance companies and investment firms. In doing so, DORA aims to ensure that the European financial sector remains resilient even in the face of severe operational disruptions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Cyberbytes-Issue-3-ISG-Banner.jpg" length="70492" type="image/jpeg" />
      <pubDate>Thu, 07 Mar 2024 12:50:35 GMT</pubDate>
      <guid>https://www.osmond.ch/cyberbytes-issue-1-24-the-who-what-when-and-why-digital-operational-resilience-act</guid>
      <g-custom:tags type="string">#FinTech,#RiskManagement,#CyberBytes,#EURegulation,#CyberLaw,#CyberCompliance,#FinancialCybersecurity,#DigitalResilience,#DORA2024,#OperationalResilience</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Cyberbites+no+2+picture.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/Cyberbytes-Issue-3-ISG-Banner.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyber Risk Specialists: Masters of Mitigation in the Digital Age</title>
      <link>https://www.osmond.ch/my-post5bf285f2</link>
      <description>As cyber threats grow in scale and complexity, a new breed of specialists is emerging to manage digital risk. This article explores the evolving role of cyber risk professionals, why their expertise is critical, and how they help organizations stay resilient in an increasingly connected world.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber Risk Specialists: Masters of Mitigation in the Digital Age explores how today’s experts tackle rising cyber threats with precision and foresight.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber risk management, also known as cybersecurity risk management, is the process of identifying, prioritising, managing and monitoring risks to information systems. In today's interconnected world, organisations rely heavily on information technology for critical business functions. However, this reliance exposes them to various cybersecurity threats, including cybercriminal activity, employee error, natural disasters, and more. These risks can result in lost revenue, data breaches, long-term reputational damage and regulatory fines.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/f882903b/dms3rep/multi/cyberunity_cyber-security_masters-of-mitigation-2b8805bf.jpg" length="215240" type="image/jpeg" />
      <pubDate>Fri, 02 Jun 2023 17:20:31 GMT</pubDate>
      <guid>https://www.osmond.ch/my-post5bf285f2</guid>
      <g-custom:tags type="string">#RiskSpecialists,#RiskManagement,#CyberAwareness,#OperationalRisk,#CyberSecurity,#DigitalTransformation,#DigitalResilience,#CyberRisk,#CyberThreats</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/cyberunity_cyber-security_masters-of-mitigation-2b8805bf.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/f882903b/dms3rep/multi/cyberunity_cyber-security_masters-of-mitigation-2b8805bf.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
