Leadership Learning from the pandemic

What advice do you have for fellow infosec leaders on what you've learned? "Keep it simple and straightforward. I’d much …

Cyber security Just how secure is secure?

Sponsored by IBM
“How can you balance being really secure and paying through the nose?” Join us as we discuss how unacceptable business …

Threat intelligence Threat hunting or threat detection: what’s more important?

Sponsored by IBM
Threat hunting is computationally expensive while threat detection can run in the background. But that’s hardly the full story. Join …

Threat intelligence Determining the landscape of attacks

Sponsored by IBM
“Yet another framework, yet another set of terminologies…” Join us as we discuss cyber security databases and the effectiveness of …

Risk management Weighing up risk and operational efficiency

Sponsored by IBM
“You never want the cure to be worse than the disease”. Join us as we discuss the practical constraints around …

Risk management How do you demonstrate the cost-opportunity value to the business of reducing risk?

"In IT and Operations, they learned how to do this decades ago.  It's about time in security we learned to …

Communication Is the DevSecOps challenge a technology issue?

"Trying to solve this with just technology is what got us into the problem in the first place."   Sebastian …

Leadership When it comes to DevSecOps, what’s the role of the CISO and who’s responsible?

"I don't own risk for the organisation.  It's my job to inform management and my peers on what I think …

News How to connect Application Security to your business objectives

Organisations today are facing mounting pressure to stay ahead of costly attacks and protect sensitive data while still delivering digital …

Leadership “The role of the CISO is to enable business”

"Moving myself out of my security 'ivory tower' was one of the best things I ever did"   Dr Paul …