
Empowering victims: Why language matters in cybersecurity
Interpol has called to end the use of the phrase ‘pig butchering scams’. Why do words matter, and how can we use language to empower cybercrime victims?
Read MoreWhat is the hot topic of the year in the current cyber landscape?
Zero-trust architecture.
What are some of the biggest threats, that are not being talked about enough?
Boosting cybersecurity through AI.
How do you react to constantly changing threats in the market?
Strategic planning, and Tactical Planning - Those two helps organizing the change management and keeping people engaged.
How do you quantify risk?
I’m a fan of mixing both quantitative & qualitative methods, purely quantifying risks may add unnecessary complexity.
What are some of your favorite "new" technologies or tools
Network Detection and Response (NDR), and Encrypted Traffic Analysis (ETA)
What are some of the key components to succeeding as a CISO in today’s business environment?
Learn, read, stay hungry for information.
What are the three things that you as CISO look at first to assess an organization’s cybersecurity readiness?
Understanding Your business, developing a strategic and tactical plan, Governance for your initiative to walk the talk.
If you had a time machine, what advice would you give yourself at the beginning of your career in cyber?
Invest more time in professional certification.
Join the newsletter to receive the latest updates in your inbox.
Interpol has called to end the use of the phrase ‘pig butchering scams’. Why do words matter, and how can we use language to empower cybercrime victims?
Read MoreHow GenAI could combat fake news, and why the problem of deception and truth goes beyond technology.
Read MoreLearn how an ethical hacker might work to evaluate your organisation’s IoT security with penetration testing.
Read More