In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

GDPR Post-Brexit: What are the challenges for the ICO?

What are the challenges for the ICO in the coming year, post-Brexit? How will ongoing investigations with EU countries be …

Cyber skills COVID-19 – How will the pandemic affect the cyber recruitment industry

"A client of ours has asked to only see candidates with their own laptops".  Ian Donnelly, Principal Consultant (Cyber Security) at …

Communication How can attackers and defenders learn from and communicate with each other

"When you're doing threat modelling, invite the Red Team in and see how they can contribute".  Sebastian Avarvarei, Director - …

Artificial Intelligence AI could help solve the privacy problems it has created

The stunning successes of artificial intelligence would not have happened without the availability of massive amounts of data, whether its …

Artificial Intelligence From robodebt to racism: what can go wrong when governments let algorithms make the...

Algorithmic decision-making has enormous potential to do good. From identifying priority areas for first response after an earthquake hits, to …

Breach How long is too long to respond to a breach?

A week? A day? An hour?! Watch Dave Chatterjee, Associate Professor, The University of Georgia, for his take on how …

Risk management Security job number one: Risk dialog with the business

The biggest problem in information security isn’t finding attackers, it isn’t patching systems and it isn’t even stopping phishing attacks. …

Cyber security Where should accountability for OT security fall within an organisation?

In today’s connected world everything, from power grids and public transport to manufacturing and logistics, has had an upgrade to …

Cyber skills The Cyber ​​Skills Gap – a lack of talent or bad recruitment methods

"The supply is not obviously meeting the demand.  We have to look at alternative measures."  Anna Delaney interviews Ian Donnelly, …

Remote working Remote cyber security: Profiling the five types of user

The UK’s workforce has been working from home, where possible, for over two months now. And whilst the lockdown restrictions …

Resilience Why hackers’ old habits die hard

Remember HeartBleed – a security bug in the OpenSSL cryptography library that affected half a million sites in 2014? Six …

Remote working Safe and secure? Why a return to work needs careful planning

Jay Ryerse, Vice President of Cybersecurity Initiatives for ConnectWise, explains how organisations need to prepare for bringing remote workers back …