Search

Search Result Image for 'Building a risk-based cybersecurity architecture'
Building a risk-based cybersecurity architecture
Christopher Hodson·20 October 2019·Cyber Security
...I have recently joined the Cybrary Mentorship Program. I have really enjoyed my time thus far, providing students across the globe with a few insights from my time in the field working as a CISO, architect, designer, and systems engineer. I’m helping the guys at Cybrary with their CISO-based syllabus… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Towards a new model of data ownership'
Towards a new model of data ownership
JC GAILLARD·17 October 2019·Cyber Security
...In anything but name, data is today’s most used currency. In the current business paradigm, structured by big tech firms over a decade ago and replicated since by a number of online platforms, individuals willingly provide their personal information in exchange for a service. Personal data is subsequently repackaged –… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'What Cyber Resilience is not about…'
What Cyber Resilience is not about…
JC GAILLARD·18 September 2019·Cyber Security
...Cyber resilience must not be used to legitimise window-dressing practices around cyber security. Although the theme is gaining momentum, there is a certain amount of confusion around what cyber resilience really means for organisations. For many, it is just another piece of consultant jargon: An abstract managerial concept with little… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'CMOs: front burner priorities'
CMOs: front burner priorities
Mark Hewitt·1 September 2019·Customer Engagement
...What is the experience you want your customers to have with you as a company? Balancing what customers want and where you need to be evolving your business is becoming increasingly challenging, and marketing is a key figure in the change. CMOs are juggling a lot of priorities these days. Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Cloud-Native Environments: a challenge for traditional cyber security practices'
Cloud-Native Environments: a challenge for traditional cyber security practices
JC GAILLARD·28 August 2019·Cyber Security
...Blind trust is no longer enough in the era of GDPR. Clouds are those blurred masses of condensed watery vapor floating in the sky whose gloomy nature often leads to questionings around their true physical state. Are they really tangible? Could we touch what we look up to? And above… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'The Digital Transformation of physical security for business'
The Digital Transformation of physical security for business
Nathan Sykes·27 August 2019·Cyber Security
...Now, more than ever, physical security is a huge issue for many organizations the world over. It’s not just in the United States, where we regularly see active shooter situations, but also internationally, where similar dangerous attacks occur. There’s a real concern when it comes to locking down and protecting… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'The offline reality of protecting data'
The offline reality of protecting data
Nathan Sykes·27 August 2019·Cyber Security
...One of the most vulnerable aspects of any data center lies with its physical infrastructure, not just online content or digital tools. Commonly, managers tend to discuss the concept of securing stored information via digital means, which might include firewalls, real-time IP monitoring and even regular data backups. These things… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Cyber Security in the “when-not-if” era'
Cyber Security in the “when-not-if” era
JC GAILLARD·18 August 2019·Cyber Security
...No longer just as an equation between risk appetite, compliance requirements and costs. The “When-Not-If” paradigm around cyber-attacks is changing the deal completely around cyber security. Many large organisations now assume that breaches are simply inevitable, due to the inherent complexity of their business models and the… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Should the tech industry be broken up?'
Should the tech industry be broken up?
Chris Murphy·30 July 2019·Cyber Security
...Cybersecurity fails because secure activity damages Big Data, and Big Data controls cybersecurity because of the incestuous environment in the tech industry. If “Secret” level security is deployed, think of how much data Big Data will not have access too. Expecting a tech company to solve a client’s cybersecurity problem… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'IoT Security: A simple matter of common sense for product developers and investors'
IoT Security: A simple matter of common sense for product developers and investors
JC GAILLARD·24 July 2019·Cyber Security
...Security basics should be part of any MVP. Period. After almost 5 years (at least) of constant media coverage around IoT privacy invasions and security breaches, it is staggering to see some sectors of the tech industry apparently still struggling with those matters. For many analysts, it all boils down… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'The two factors killing GRC practices'
The two factors killing GRC practices
JC GAILLARD·30 June 2019·Cyber Security
...Excessive complexity and lack of first line integration render many GRC metrics useless. Many CISOs complain of communication problems with their business. They are not being listened to. They are not getting the budget they think they should get. They feel their business prioritises against security too… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'A strategic CIO on culture and talent'
A strategic CIO on culture and talent
Connected Futures from Cisco·23 June 2019·People & Change
...“CIOs are being asked to step up our game,” says Cisco CIO Guillermo Diaz Jr., “to be business liaisons, the bridge between the technology and business outcomes.” However, to do that demands sweeping culture change in IT – which Diaz calls the hardest part of digital transformation. A true strategic… Read More...
 thedigitaltransformationpeople.com· 0 Shares