In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Cyber security What is EDR and is it failing?

Migo Kedem, Senior Director, Products and Marketing at SentinelOne, talks about what EDR is, what problems it was created to …

Data protection How clever data management protects you from ransomware

Jasmit Sagoo, senior director, Head of Technology UK&I, Veritas, explains how to best prepare for a ransomware attack with 5 key …

Leadership “The more you understand people, the better security leader you can be” – Kevin...

Kevin Fielder looks more like an Olympic athlete than a CISO. Not that CISOs can’t look muscular or don’t look …

Cloud security How to improve cloud security, privacy, and compliance

Fouad Khalil, VP of Compliance at SecurityScorecard, who assesses the continuous oversight in the cloud and how to improve cloud …

Leadership Paving the way for younger leaders in information security

Tom Linckens, Former Executive Vice President and Chief Information Officer, Bertelsmann, explains how information sharing between the public and private …

Leadership Tech leaders need to culture-hack

What defines first-rate leadership? Tom Linckens, Former Executive Vice President and Chief Information Officer, Bertelsmann, joined us at #teissAmsterdam2019 to …

Cyber security Is it time for security to go back to basics?

Tim Bandos, Vice President of Cyber Security, Digital Guardian discusses how companies should and can go back to basics to …

Mental health Bio hacker Kevin McPeake opens up about Asperger’s and ADHD

Understanding mental health is integral for organisations in promoting and safeguarding employee wellbeing. Kevin McPeake, Cybersecurity Culture and Ethics Specialist, …

Leadership How to ensure your IT strategy is strategic, not reactive

Julian Box, CEO at data privacy specialist Calligo, discusses how companies can ensure that their outsourced IT partners deliver value …

Information security Cyber security trends – what’s on the horizon?

Todd Kelly, CSO at Cradlepoint, discusses the main cyber security themes that have been shaping the IT landscape and look …

Information security How to use a zero-trust model to strengthen security

John Stock, product manager, Outpost24, discusses how organisations can improve security by implementing zero-trust models.  In the recently released Verizon …

SMEs Majority of SMBs using outdated Windows OS versions & email servers

A large number of small and medium businesses (SMBs) are still using outdated versions of the Windows operating system, outdated …