From access to impact: why 2025 was the year OT threats grew teeth
OT cybersecurity took a hit in 2025 as threat groups mapped control loops and targeted distributed energy – shrinking the gap between access and physical impact.
Read More
What is the hot topic of the year in the current cyber landscape?
Zero-trust architecture.
What are some of the biggest threats, that are not being talked about enough?
Boosting cybersecurity through AI.
How do you react to constantly changing threats in the market?
Strategic planning, and Tactical Planning - Those two helps organizing the change management and keeping people engaged.
How do you quantify risk?
I’m a fan of mixing both quantitative & qualitative methods, purely quantifying risks may add unnecessary complexity.
What are some of your favorite "new" technologies or tools
Network Detection and Response (NDR), and Encrypted Traffic Analysis (ETA)
What are some of the key components to succeeding as a CISO in today’s business environment?
Learn, read, stay hungry for information.
What are the three things that you as CISO look at first to assess an organization’s cybersecurity readiness?
Understanding Your business, developing a strategic and tactical plan, Governance for your initiative to walk the talk.
If you had a time machine, what advice would you give yourself at the beginning of your career in cyber?
Invest more time in professional certification.
Join the newsletter to receive the latest updates in your inbox.
OT cybersecurity took a hit in 2025 as threat groups mapped control loops and targeted distributed energy – shrinking the gap between access and physical impact.
Read More
Ransomware now reaches full encryption in just three hours. Analysis of Barracuda and Securin data reveals how Akira and others are accelerating attacks.
Read More
The average time to exploit has fallen from 745 days in 2020 to just 44 days in 2025, according to Flashpoint. Here’s why N-day vulnerabilities are driving faster attacks.
Read More