
Video: CISO 2.0: Becoming the IT Security Business Leader
IT Security may be modernising and becoming board-savvy, as IT did before it. But there…
thedigitaltransformationpeople.com
IT Security may be modernising and becoming board-savvy, as IT did before it. But there…
thedigitaltransformationpeople.com
With recent high-profile information security breaches featuring some form of credential theft to enable abuse…
thedigitaltransformationpeople.com
When you and your friends gathered around your television in February for Super Bowl 50,…
thedigitaltransformationpeople.com
What keeps the CISO awake at night?In our latest GDS Video Snack from MeetTheBoss TV…
thedigitaltransformationpeople.com
A Checklist for controls to protect from Ransomware: Block access to websites with unwanted…
thedigitaltransformationpeople.com
I was happily ignorant about information risk , until very recently - when I got…
thedigitaltransformationpeople.com
What is RANSOMWARE? RANSOMWARE is a fast emerging dangerous malware that gets introduced into PCs and…
thedigitaltransformationpeople.com
Can you hear me major Tom? While there is little certainty in debates whether life…
thedigitaltransformationpeople.com
Cybersecurity ranks high on the list of things that keep C-Suiters up at night. And…
thedigitaltransformationpeople.com
Over the years there’s been much talk about women in cyber security. For example, are…
thedigitaltransformationpeople.com