In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Cyber crime COVID-19’s impact on the data breach landscape

Cyber criminals are adapting to the opportunities created by the pandemic. Organisations need insight combined with comprehensive security strategies to …

Nation states Standing-up to the challenge of China

In the aftermath of the decision to pull Huawei from the UK's 5G network, there is a need for a …

Resilience What does the “new normal” for risk and resilience professionals look like?

"As Risk professionals, we can't just have one point of view and one trajectory" Ahead of teissR3 | Resilience, Response …

Risk management What opportunities do you see for organisations in this new world?

"It isn't just about cost.  It's about value, and creating a resilient business."   Michelle Griffey, Chief Risk Officer at …

Resilience Ensuring remote SOC teams work together efficiently

"People have to be in tune with one another if they are going to work well together" Greg van der …

ComplianceGDPR Building the foundations of effective data protection compliance

Privacy by design, underpinned by data classification, is an essential component of compliance with the Data Protection Act and GDPR

Risk management How do you demonstrate the cost-opportunity value to the business of reducing risk?

"In IT and Operations, they learned how to do this decades ago.  It's about time in security we learned to …

Resilience How do you make sure you are resilient against something you can’t predict, like...

"If you can change your mindset so that you are comfortable with uncertainty, then you can weather anything."   Dr …

Resilience What is the culture of a resilient organisation, and what are the biggest blockers...

"The biggest cultural blocker to being resilient is defensiveness."   Dr Sandra Bell, CEO and Founder of the Business Resilience …

Resilience How do you increase resilience, and what will organisations need to do to maintain...

"We need to start using technology to do those back office routines that haven't been outsourced before."   Michelle Griffey, …

Remote working Encryption and endpoint control: the heroes of post-lockdown data security

The world may have slowed down somewhat in recent months, but cyber-attackers haven’t paused for a second. Some big names …

Leadership How can leadership teams be empowered to be more effective in handling an organisation’s...

"These are all things that can be coached.  There's no substitute for practice.  The more you can practice it, the …