Cyber Security

Towards a new model of data ownership?

Towards a new model of data ownership

By JC GAILLARD

In anything but name, data is today’s most used currency. In the current business paradigm,…

thedigitaltransformationpeople.com

What Cyber Resilience is not about…

What Cyber Resilience is not about…

By JC GAILLARD

Cyber resilience must not be used to legitimise window-dressing practices around cyber security. Although the…

thedigitaltransformationpeople.com

Cyber-attacks Security in the “when-not-if” era

Cyber Security in the “when-not-if” era

By JC GAILLARD

No longer just as an equation between risk appetite, compliance requirements and costs. The “When-Not-If” paradigm around…

thedigitaltransformationpeople.com

Should the tech industry be broken up?

Should the tech industry be broken up?

By Chris Murphy

Cybersecurity fails because secure activity damages Big Data, and Big Data controls cybersecurity because of…

thedigitaltransformationpeople.com

The two factors killing GRC practices

The two factors killing GRC practices

By JC GAILLARD

Excessive complexity and lack of first line integration render many GRC metrics useless. Many CISOs…

thedigitaltransformationpeople.com