The CISO and the Business
Keep appointing pure technologists in CISO roles and you’ll never win. The Wannacry ransomware attack that…
thedigitaltransformationpeople.com
is this doing anything
																	
															Keep appointing pure technologists in CISO roles and you’ll never win. The Wannacry ransomware attack that…
thedigitaltransformationpeople.com
																	
															Less than 12 months to go and nowhere to hide as potential fines could reach…
thedigitaltransformationpeople.com
																	
															Corporate culture and the profile of the CISO are key, over and above any arbitrary…
thedigitaltransformationpeople.com
																	
															This is the complete Proof-of-Identity series. Each subject is 1300 characters or less. Security Protocols…
thedigitaltransformationpeople.com
																	
															Petya Ransomware is different than regular ransomwares we have seen in. It infects low-level structure…
thedigitaltransformationpeople.com
																	
															One of my favourite stories as a child was Chicken Licken. I'm sure you'll know…
thedigitaltransformationpeople.com
																	
															Organizations all over the EU must be aware by now that the Data Protection Act…
thedigitaltransformationpeople.com
																	
															It is no big secret that the “Three Lines of Defence” model underpinning many GRC…
thedigitaltransformationpeople.com
																	
															Today’s consumers are more powerful than ever before, and get every bit of information that…
thedigitaltransformationpeople.com
																	
															Roll up, roll up, shouts the cybersecurity tout at the conference. "Are you ready to…
thedigitaltransformationpeople.com
																	
															Over the past 6 months, social media and the Internet have been inundated with GDPR-related…
thedigitaltransformationpeople.com