fbpx
Skip to content
CLN

CLN

CLN
  • Home
    • About
  • Latest Interviews
  • Our Network
  • Contact Us
  • Facebook Icon
  • Twitter Icon
  • YouTube Icon
  • LinkedIn Icon

Author: Cyber Leaders Network

“It’s relatively easy to land a new firewall, it’s incredibly difficult to shift an entire business culture” – An Interview with Phil Scully

October 3, 2020 Cyber Leaders Network

Phil Scully has made a name for himself as an experienced business architect, having held roles at some of the…

Continue Reading

Posted in: Full Interview Filed under: Cyber Security, Information Security, Skills

Cyber Security in the Clouds and CISOs in the Boardroom – An Interview with David Lello

August 13, 2020 Cyber Leaders Network

Having previously worked within the banking industry for almost 5 years, David Lello has worked on lots of transformative projects…

Continue Reading

Posted in: Full Interview Filed under: challenges, cloud, Cyber Security, Information Security, threats

Law and Digital Order: Why Achieving ISO27001 Certification Is Merely The Beginning

July 31, 2020 Cyber Leaders Network

As one of the leading legal firms in the technology space, Bird & Bird have successfully developed information security into a…

Continue Reading

Posted in: Full Interview Filed under: Cyber Security, Information Security, Skills

Protect your organisation, by thinking like a hacker – An Interview with Bridget Kenyon

July 17, 2020 Cyber Leaders Network

Bridget Kenyon is a highly experienced member of the information security industry, holding CISO roles at a number of companies…

Continue Reading

Posted in: Full Interview Filed under: Cyber Security, Information Security, Skills

Building your cyber team and the underestimated role of diversity – An Interview with Vickie Guilloit

June 21, 2020 Cyber Leaders Network

Victoria Guilloit is a leading expert in cyber security and privacy awareness, providing education and training to large brands such…

Continue Reading

Posted in: Full Interview Filed under: Cyber Security, Information Security, Skills

Why cyber criminals should be targeting SME’s & how AI will impact the cyber landscape – An Interview with Steve Wright

Cyber Leaders Network

As Former (Interim) DPO to the Bank of England, and Group Data Privacy & Infosec Officer of John Lewis, Steve…

Continue Reading

Posted in: Full Interview Filed under: Cyber Security, Information Security, Skills
Shanne Edwards discusses the next steps after implementing a Security Target Operating Model.

Security Target Operating Models: Key Things to Define

June 6, 2020 Cyber Leaders Network

A member of the NCC Group Risk Management team, Shanne Edwards has helped some of the largest organisations in the…

Continue Reading

Posted in: Interview Part
Shanne Edwards discusses how Security Target Operating Models affect resourcing and people.

Security Target Operating Models, People and Resourcing

Cyber Leaders Network

Shanne Edwards is a change agent with international and national experience with implementing positive business transformations at all levels. Having…

Continue Reading

Posted in: Interview Part
Shanne Edwards discusses the benefits of Security Target Operating Models.

The Benefits of Security Target Operating Models

Cyber Leaders Network

Shanne Edwards is considered an expert change agent and is currently working with the NCC Risk Management Group on a…

Continue Reading

Posted in: Interview Part
Shanne Edwards explains how to get Senior Stakeholders to buy into your Security Model.

Getting Senior Stakeholders to buy into Security Models

Cyber Leaders Network

How can you get Senior Stakeholders to buy into your Security Target Operating Models? We posed the question to Shanne…

Continue Reading

Posted in: Interview Part

Post navigation

Page 1 of 7
1 2 … 7 Next →

Navigation

  • Home
  • About Us
  • Latest Interviews
  • Cyber Advisory Services
  • Our Network
  • Privacy Policy
  • Contact Us

Latest Interviews

  • “It’s relatively easy to land a new firewall, it’s incredibly difficult to shift an entire business culture” – An Interview with Phil Scully
  • Cyber Security in the Clouds and CISOs in the Boardroom – An Interview with David Lello
  • Law and Digital Order: Why Achieving ISO27001 Certification Is Merely The Beginning
  • Protect your organisation, by thinking like a hacker – An Interview with Bridget Kenyon

Join Our Newsletter

Sign up to receive timely, useful information in your inbox.


Copyright © 2018 Cyber Leaders' Network
We use cookies to ensure that we give you the best experience on our website. By continuing to use this site you consent to the use of cookies on your device as described in our privacy policy. ACCEPT REJECT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.

Necessary Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

Enter your email to receive our latest interviews with leading CISO’s and business leaders

Sign up to The Cyber Leader’s Network to receive our latest interviews with leading CISO’s and business leaders.