In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Cyber security ISF cyber security resources to survive the COVID-19 pandemic

Sponsored by ISF
Our friends at the Information Security Forum (ISF) have compiled some useful resources to keep you and your businesses secure …

Communication Keil Hubert on the MOST dangerous assumption in cyber security

It’s human nature to believe that the skills we don’t possess must be intuitively easy to master. That overconfidence can …

GDPR ICO’s Director of Investigations shares his predictions for 2020

It's not always easy to predict what's going to happen over the coming year! However, when it comes to what …

Communication How can a CISO develop good communication skills?

CISOs are under pressure to develop strong communication skills. That might be a challenge for the natural introvert...so how does …

Cyber security teissAwards2020…and the winners are?

The teissAwards2020 – our inaugural awards’ ceremony – proved to be a resounding success. The glamorous affair took place on …

Authentication Powerful cryptomining capabilities for sale in ‘off the shelf’ malware

A close collaboration between cybercrime and APT groups is delivering back-doored machines using SSH machine identities.

Cyber skills Recruiting cyber talent: The candidate you really should have on your team

If you’re not prepared to answer difficult questions about your organisation’s recent challenges, then you probably shouldn’t be interviewing new …

Cloud security Assuming responsibility for data protection in the cloud

Sponsored by iStorage
Given the responsibility to ensure data protection in the cloud, how can organisations encrypt, share and manage data securely? Data …

Cyber security Zooming in on UEBA: answering the ‘what’ and the ‘how’

Sponsored by ManageEngine
What is UEBA? User and entity behaviour analytics (UEBA) is a relatively new category of cybersecurity tools that utilise machine …

GDPR GDPR and credential stuffing attacks: yes, they are reportable

Sponsored by Specops
Credential stuffing and password spraying attacks are reportable data breaches in compliance with GDPR. Any organisation based in the EU …

Cyber skills What cyber skills gap?

There's a cyber security skills gap...or is there? What's the real issue here? Watch this Security Leaders' Roundtable where Nic …

Cyber security Why MITRE ATT&CK™ is the cybersecurity framework of 2020

Sponsored by Immersive_Labs
Security fragmentation is one of the biggest issues facing cybersecurity leaders today. The threat landscape is growing rapidly – there …