Towards a new model of data ownership
In anything but name, data is today’s most used currency. In the current business paradigm,…
thedigitaltransformationpeople.com
In anything but name, data is today’s most used currency. In the current business paradigm,…
thedigitaltransformationpeople.com
Cyber resilience must not be used to legitimise window-dressing practices around cyber security. Although the…
thedigitaltransformationpeople.com
Blind trust is no longer enough in the era of GDPR. Clouds are those blurred…
thedigitaltransformationpeople.com
World-class interim transformation leaders and subject matter experts for maximum impact on your business. No agency fees.
Now, more than ever, physical security is a huge issue for many organizations the world…
thedigitaltransformationpeople.com
One of the most vulnerable aspects of any data center lies with its physical infrastructure,…
thedigitaltransformationpeople.com
No longer just as an equation between risk appetite, compliance requirements and costs. The “When-Not-If” paradigm around…
thedigitaltransformationpeople.com
Cybersecurity fails because secure activity damages Big Data, and Big Data controls cybersecurity because of…
thedigitaltransformationpeople.com
Security basics should be part of any MVP. Period. After almost 5 years (at least)…
thedigitaltransformationpeople.com
Excessive complexity and lack of first line integration render many GRC metrics useless. Many CISOs…
thedigitaltransformationpeople.com
Key factors for boards and executive management to consider in 2019 around cyber security and…
thedigitaltransformationpeople.com
Simply throwing money at the problem is rarely the answer. Many CIOs and CISOs would…
thedigitaltransformationpeople.com