Mobile network operators: when compliance crowds out security
Are mobile network operators spending more time on cybersecurity compliance than real risk reduction? New research explores box-ticking, resilience, and regulation.
Read More
What is the hot topic of the year in the current cyber landscape?
Like every year and it’s not getting any better: Cyber talent shortage.
What are some of the biggest threats, that are not being talked about enough?
Unintentional insider threats
How do you react to constantly changing threats in the market?
Continuous risk management
How do you quantify risk?
By understanding, your threats and vulnerabilities
In the event of a data breach, what is your response plan?
Very detailed, but most importantly should be constantly tested
What are some of your favorite "new" technologies or tools
BAST, The Human Firewall Program, and deception technologies
What are some of the key components to succeeding as a CISO in today’s business environment?
Governance and roles and responsibilities with a proper reporting line
What are the three things that you as CISO look at first to assess an organization’s cybersecurity readiness?
People, Process, and Technology.
If you had a time machine, what advice would you give yourself at the beginning of your career in cyber?
I would focus on soft skills early on, such as relationship building, communications, negotiations, etc.
You are set to the stage at Black Hat MEA this November, what can our audience expect from your session, and what are you most excited about?
Sweat equity goes a long way. With my 37 years of experience 12 out of which as a professional instructor at George Washington University where I moved from designing systems and databases to programming and from biometric security to cybersecurity, and tens of conferences at which I spoke, it will enrich the audience’s knowledge and provide them with taste of the freshly squeezed juice of that experience.
Join the newsletter to receive the latest updates in your inbox.
Are mobile network operators spending more time on cybersecurity compliance than real risk reduction? New research explores box-ticking, resilience, and regulation.
Read More
Cyber resilience is everywhere – but what does it really mean? We unpack the buzzword, the data behind it, and what resilient organisations actually do.
Read More
Human risk remains one of the biggest cybersecurity threats in 2026. New data shows why people, not just AI, are still being exploited – and what CISOs must do next.
Read More