In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Machine identities Remote workers and weak machine identities: a dangerous mix

With more people working remotely, hackers are targeting SSH machine identities to gain access to critical systems. Protecting SSH keys …

Crisis response How do you build agility into organisations to make sure they can flex during...

"There's a lot of focus on 'plans'. They're not the thing that's important. It's the process of planning that is." …

Remote working Trust and remote working: The new frontier for security professionals

It is impossible to avoid the seismic shift in working culture which Covid19 has ushered in. The explosion of remote …

Data protection Is your data as safe as you think it is?

Today’s data protection market is more complex than many of us would at first believe. The reason is closely tied …

Crisis response How do you make sure that the learnings from one incident are transferable to...

"What you need is that leader...who identifies that the outcome is the same"   Michelle Griffey, Chief Risk Officer at …

Communication Is the DevSecOps challenge a technology issue?

"Trying to solve this with just technology is what got us into the problem in the first place."   Sebastian …

Resilience What are the challenges in bringing across a message of cyber resilience across an...

"The way we adapted was...moving as much as we can to fit the situation we find ourselves "   Nick …

Board level At board level, what sort of governance changes are we going to see?

"We've got to be able to make decisions in a very ambiguous world, very, very quickly."   Michelle Griffey, Chief …

Leadership When it comes to DevSecOps, what’s the role of the CISO and who’s responsible?

"I don't own risk for the organisation.  It's my job to inform management and my peers on what I think …

Resilience How is resilience being defined in your organisation?

"We've taken the approach that our staff are out strongest layer of defence.  So, let's help them do that"   …

Leadership How to foster a culture of security in uncertain times

With the pandemic, the switch to remote working on a much larger scale than companies were used to has accelerated …

Resilience Do you have advice for information security leaders on building cyber resilience?

"From all that effort, it made the delivery much easier.  We had...data which said which audiences needed what sort of …