In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Information security How to tackle device authentication and data security in the healthcare industry

John Grimm, Senior Director of Strategy and Business Development at nCipher Security, discusses the steps healthcare providers and device manufacturers …

Information security How to use deception to gain the advantage over cyber-attackers

Tricking the trickster? Carolyn Crandall, Chief Deception Officer at Attivo Networks, shows us how to turn the attackers' techniques against them. …

Information security The five most common social engineering attacks targeting your Wi-Fi

Tal Shabi, Software Engineer at Imperva, outlines the top five most common social engineering attacks and how your business can …

Leadership From cinema to reality – three things every business can learn from disaster movies

Sponsored by SungardAS
In dramatic style, Kathy Schneider, CMO, Sungard Availability Servic, outlines three things every business can learn from disaster movies... We …

Cyber skills Five key considerations for CISOs that are easily overlooked

Jan van Vliet, VP and GM of EMEA, Digital Guardian highlights five key points for CISOs that are often overlooked …

Information security How to protect your digital assets by achieving full visibility

Eoin Keary, CEO and co-founder of edgescan, discusses why organisations are still failing to get the fundamentals of security right. …

Information security How can we define risk in cyber insurance?

Matthew McKenna, VP EMEA at SecurityScorecard, discusses the ever-growing popularity of cyber insurance and how security ratings can be used …

Information security Password security: how does your organisation compare to others?

By Gerald Beuchelt, CISO at LogMeIn, says that businesses are struggling to quantify their own level of password risk, even …

Information security Why cyber security is no longer restricted to the IT department

Adrian Crawley, Northern European Director, SailPoint, highlights the importance of data governance, showcasing the pitfalls of what can happen when …

Information security Red Team: Not all superheroes wear capes

Hugo van den Toorn, Manager Offensive Security at Outpost24, explains what Red Teaming assessments involve and how the benefits of …

Information security Security training: why one approach is not going to work

Security training isn’t a one-to-one analogue for technical skills instruction, especially when you’re training non-technical people. Security trainers need to …

Cloud security Could sovereign public cloud be a game changer for Britain’s public sector?

Sponsored by SungardAS
Chris Huggett, Senior Vice President, EMEA & India at Sungard AS, discusses how sovereign public cloud is starting to transform …