In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Cyber skills Five key considerations for CISOs that are easily overlooked

Jan van Vliet, VP and GM of EMEA, Digital Guardian highlights five key points for CISOs that are often overlooked …

IAM IAM: how analytics is changing everything

idax uses entitlement information to generate insights into who has access to either data or systems they should not have. …

Information security How OneTrust helps with information security

As adequate security becomes a legal mandate, there is a greater understanding that privacy is not truly attainable without security. …

Information security What to look for when selecting an MSSP

Medium to large organisations increasingly rely on managed security service providers (MSSPs) to deliver security monitoring, threat detection and incident …

Communication “As a CISO, you want to be part of the communication mechanism” – Bridget...

Bridget Kenyon has me hooked on her words; she flits from black holes to baking with equal confidence and enthusiasm. …

Supply chain Are supply chains fit for purpose in the 21st century?

Are the supply chain processes fit for purpose in the 21st century? Bridget Kenyon, Global CISO, Thales eSecurity, joined us …

Cyber security What can sport teach us about improving cyber security?

Speaking at #teissLondon2019 on implementing teachings from sport, Ian Burgess, Head of Cyber Security, UK Finance, explains why strong cyber …

Cyber security Should algorithms decide our fate?

The prolific use of algorithms has aided the decision-making process in many aspects of our lives. Speaking at #teissLondon2019, Mark …

Nation states What can the UK learn from other nations about mitigating cyber threats?

Is collaboration the key? Speaking at #teissLondon2019 Kirill Kasavchenko, Principal Security Technologist, CTO Netscout Arbour discusses why he believes that …

Brexit Manufacturing cyber security – the Brexit lookout

With the Brexit uncertainty and major bumps in the road ahead, how can manufacturers ensure cyber security doesn’t worsen the …

Cyber skills How to break into Penetration Testing – an expert’s guide

In his role leading penetration testing services at Trustwave, Lawrence Munro, VP SpiderLabs, has pulled together the attributes, experience and qualifications he …

Cloud security How to protect sensitive cloud environments from persistent insider threats

Steve Armstrong, Regional Director of UK, Ireland, and South Africa at Bitglass, discusses the four main types of insider threats …