
The CISO and the Business
Keep appointing pure technologists in CISO roles and you’ll never win. The Wannacry ransomware attack that…
thedigitaltransformationpeople.com
Keep appointing pure technologists in CISO roles and you’ll never win. The Wannacry ransomware attack that…
thedigitaltransformationpeople.com
Less than 12 months to go and nowhere to hide as potential fines could reach…
thedigitaltransformationpeople.com
Corporate culture and the profile of the CISO are key, over and above any arbitrary…
thedigitaltransformationpeople.com
This is the complete Proof-of-Identity series. Each subject is 1300 characters or less. Security Protocols…
thedigitaltransformationpeople.com
Petya Ransomware is different than regular ransomwares we have seen in. It infects low-level structure…
thedigitaltransformationpeople.com
One of my favourite stories as a child was Chicken Licken. I'm sure you'll know…
thedigitaltransformationpeople.com
Organizations all over the EU must be aware by now that the Data Protection Act…
thedigitaltransformationpeople.com
It is no big secret that the “Three Lines of Defence” model underpinning many GRC…
thedigitaltransformationpeople.com
Today’s consumers are more powerful than ever before, and get every bit of information that…
thedigitaltransformationpeople.com
Roll up, roll up, shouts the cybersecurity tout at the conference. "Are you ready to…
thedigitaltransformationpeople.com
Over the past 6 months, social media and the Internet have been inundated with GDPR-related…
thedigitaltransformationpeople.com