<?xml version="1.0" encoding="UTF-8"?>

<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
		>

	<!-- RSS feed defaults - main content -->
	<channel>
		<title>IbyIMD</title>
		<atom:link href="https://www.imd.org/ibyimd/tag/cyberattack/feed/" rel="self" type="application/rss+xml" />
		<link>https://www.imd.org</link>
		<description></description>
		<lastBuildDate>Mon, 04 May 2026 15:55:41 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
		
		<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.imd.org/wp-content/uploads/2022/10/cropped-IMD-Logo-Blue-on-transparent-Square-for-Circle-Crop-RGB-100x100.png</url>
	<title>Cyberattack - IMD Business School</title>
	<link>https://www.imd.org</link>
	<width>32</width>
	<height>32</height>
</image> 
		
		<!-- Loop through posts and generate RSS items -->
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>The rise of AI and cyberattacks: Why boards must be extra vigilant in 2026</title>
				<link>https://www.imd.org/ibyimd/governance/the-rise-of-ai-and-cyberattacks/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fgovernance%2Fthe-rise-of-ai-and-cyberattacks%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/?p=319956</guid>
				<category><![CDATA[Governance]]></category>
				<dc:creator>Didier Cossin, Yukie Saito</dc:creator>
				<pubDate>Mon, 05 Jan 2026 08:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Amid continued turbulence and transformation, boards must be ready to tackle the unexpected in the year ahead to strengthen their digital and strategic resilience....]]></description>
				<content:encoded><![CDATA[Amid continued turbulence and transformation, boards must be ready to tackle the unexpected in the year ahead to strengthen their digital and strategic resilience....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2026/01/The-rise-of-AI-and-cyberattacks-2.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Try this drill with your team today to prepare for a ransomware attack</title>
				<link>https://www.imd.org/ibyimd/brain-circuits/try-this-drill-to-prepare-for-a-ransomware-attack/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fbrain-circuits%2Ftry-this-drill-to-prepare-for-a-ransomware-attack%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=4071</guid>
				<category><![CDATA[Brain Circuits]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Fri, 18 Jun 2021 07:00:13 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[A new cybersecurity report is making headlines for its finding the vast majority of ransomware victims are attacked more than once and the costs are steep. Are you prepared to handle this...]]></description>
				<content:encoded><![CDATA[A new cybersecurity report is making headlines for its finding the vast majority of ransomware victims are attacked more than once and the costs are steep. Are you prepared to handle this...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2021/06/ransomeware.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Four questions that will help you prepare for a cyberattack</title>
				<link>https://www.imd.org/ibyimd/brain-circuits/four-questions-that-will-help-you-prepare-for-a-cyberattack/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fbrain-circuits%2Ffour-questions-that-will-help-you-prepare-for-a-cyberattack%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=3375</guid>
				<category><![CDATA[Brain Circuits]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Tue, 05 Apr 2022 06:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[It’s not a matter of if, but rather when, your organization will experience a cyberattack. Have you assembled the right team to address the problem when it happens, and have you answered...]]></description>
				<content:encoded><![CDATA[It’s not a matter of if, but rather when, your organization will experience a cyberattack. Have you assembled the right team to address the problem when it happens, and have you answered...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2021/05/fly-d-jKKhgGKqmok-unsplash-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Six cybersecurity trends for companies to get to grips with in 2022 </title>
				<link>https://www.imd.org/ibyimd/videos/leading-in-turbulent-times/six-cybersecurity-trends-for-companies-to-get-to-grips-with-in-2022/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fvideos%2Fleading-in-turbulent-times%2Fsix-cybersecurity-trends-for-companies-to-get-to-grips-with-in-2022%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=9427</guid>
				<category><![CDATA[Leading in Turbulent Times]]></category>
				<dc:creator></dc:creator>
				<pubDate>Fri, 13 May 2022 06:29:14 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[The pressure of digital transformation and geopolitical tensions are making organizations more vulnerable to cyberattacks. In this webinar, Professor Öykü Isik explained how companies can anticipate threats and execute best practices....]]></description>
				<content:encoded><![CDATA[The pressure of digital transformation and geopolitical tensions are making organizations more vulnerable to cyberattacks. In this webinar, Professor Öykü Isik explained how companies can anticipate threats and execute best practices....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2022/05/RELIVE-FeaturedImage-1440x868-1.jpg" 
						width="198"
						height="283"
					></media:content>
								<enclosure url="https://www.imd.org/wp-content/uploads/2024/06/FINAL-PODCAST-CEO-Dialogue_VODAPHONE-1.mp3" length="39684478" type="audio/mpeg" />
<enclosure url="https://www.imd.org/wp-content/uploads/2024/05/CEO-Dialogue-Novo-Nordisk-Lars-Fruergaard-Jorgensen-PODCAST-AUDIO.mp3" length="70994489" type="audio/mpeg" />
<enclosure url="https://www.imd.org/wp-content/uploads/2024/03/FINAL-PODCAST-CEO-DIALOGUE-ACWA-w-Marco-Arcelli-V03-2024_03_20_1.mp3" length="45798422" type="audio/mpeg" />
<enclosure url="https://www.imd.org/wp-content/uploads/2024/02/PODCAST-Henkel-CEO-Dialogue-Carsten-Knobel-PODCAST.mp3" length="66343126" type="audio/mpeg" />

							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Putting cybersecurity on the executive radar </title>
				<link>https://www.imd.org/ibyimd/innovation/putting-cybersecurity-on-the-executive-radar/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Finnovation%2Fputting-cybersecurity-on-the-executive-radar%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=18830</guid>
				<category><![CDATA[Innovation]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Tue, 08 Aug 2023 07:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Every board must be seriously engaged with the cybersecurity threat, warns IMD’s Öykü Işık...]]></description>
				<content:encoded><![CDATA[Every board must be seriously engaged with the cybersecurity threat, warns IMD’s Öykü Işık...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2023/05/pexels-tima-miroshnichenko-5380642-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Full transparency: 10 lessons from the cyber-attack on the British Library </title>
				<link>https://www.imd.org/ibyimd/technology/full-transparency-10-lessons-from-the-cyber-attack-on-the-british-library/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Ftechnology%2Ffull-transparency-10-lessons-from-the-cyber-attack-on-the-british-library%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=32178</guid>
				<category><![CDATA[Technology]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Mon, 30 Sep 2024 08:37:51 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[When the British Library fell victim to a major ransomware attack it opted for a policy of full transparency. Here we outline what government organizations, NGOs, and businesses can learn from the...]]></description>
				<content:encoded><![CDATA[When the British Library fell victim to a major ransomware attack it opted for a policy of full transparency. Here we outline what government organizations, NGOs, and businesses can learn from the...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2024/09/Cyber-attack-on-British-library-Featured.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>AI and cybersecurity: Think like a thief to catch a thief</title>
				<link>https://www.imd.org/ibyimd/brain-circuits/brain-circuits-ai/ai-and-cybersecurity-think-like-a-thief-to-catch-a-thief/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fbrain-circuits%2Fbrain-circuits-ai%2Fai-and-cybersecurity-think-like-a-thief-to-catch-a-thief%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=34849</guid>
				<category><![CDATA[AI]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Thu, 05 Dec 2024 07:58:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[As digital tools become more sophisticated, it’s crucial to keep three key things in mind to protect your organization from cyber-attack....]]></description>
				<content:encoded><![CDATA[As digital tools become more sophisticated, it’s crucial to keep three key things in mind to protect your organization from cyber-attack....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/png" 
						url="https://www.imd.org/wp-content/uploads/2024/12/BCcybersecurity.png" 
						width="198"
						height="283"
					></media:content>
								
							</item>
			</channel>
</rss>