
Building a risk-based cybersecurity architecture
I have recently joined the Cybrary Mentorship Program. I have really enjoyed my time thus…
thedigitaltransformationpeople.com
I have recently joined the Cybrary Mentorship Program. I have really enjoyed my time thus…
thedigitaltransformationpeople.com
In anything but name, data is today’s most used currency. In the current business paradigm,…
thedigitaltransformationpeople.com
Cyber resilience must not be used to legitimise window-dressing practices around cyber security. Although the…
thedigitaltransformationpeople.com
Blind trust is no longer enough in the era of GDPR. Clouds are those blurred…
thedigitaltransformationpeople.com
Now, more than ever, physical security is a huge issue for many organizations the world…
thedigitaltransformationpeople.com
One of the most vulnerable aspects of any data center lies with its physical infrastructure,…
thedigitaltransformationpeople.com
No longer just as an equation between risk appetite, compliance requirements and costs. The “When-Not-If” paradigm around…
thedigitaltransformationpeople.com
Cybersecurity fails because secure activity damages Big Data, and Big Data controls cybersecurity because of…
thedigitaltransformationpeople.com
Security basics should be part of any MVP. Period. After almost 5 years (at least)…
thedigitaltransformationpeople.com
‘Leading Digital Transformation’ is a weekly podcast series produced in collaboration between The Digital Transformation…
thedigitaltransformationpeople.com
Excessive complexity and lack of first line integration render many GRC metrics useless. Many CISOs…
thedigitaltransformationpeople.com