Securing Cloud Transformation
Securing Cloud Transformation Many organizations mistakenly assume that the cloud service provider is solely responsible for securing their data and applications. In reality, the responsibility for security is shared between the cloud service provider and the customer. It is crucial for organizations to understand their specific responsibilities and take steps to fulfill them. Common challenges […]
The digital divide – Safety for vulnerable people online
Ian Jenkins MA, Senior Change Consultant, CLN – previous information and risk consultant at Age UK. Spoke at the APPG (All Party Parliamentary Group) Cyber Security, alongside Dr Emma Philpott MBE, founder of UK Security Forum, and Jon France at ISC(2), looking at how cyber security can help bridge the digital divide. The ‘digital divide’ […]
“It’s relatively easy to land a new firewall, it’s incredibly difficult to shift an entire business culture” – An Interview with Phil Scully
Phil Scully has made a name for himself as an experienced business architect, having held roles at some of the worlds most credible brands across the past 17 years including Marks & Spencer, Whitbread and currently Costa. Now the CIO of the UK’s largest coffeehouse chain, we spoke to Phil about his shift into cyber […]
Cyber Security in the Clouds and CISOs in the Boardroom – An Interview with David Lello
Having previously worked within the banking industry for almost 5 years, David Lello has worked on lots of transformative projects from internet and telephone banking, to implementing cloud transformations. Now the CISO at Burning Tree, David has helped many companies embrace new security improvement programs and adopting emerging technologies, such as the Internet of Things. […]
Law and Digital Order: Why Achieving ISO27001 Certification Is Merely The Beginning
As one of the leading legal firms in the technology space, Bird & Bird have successfully developed information security into a clear core competency and significant point of difference, as highlighted by their ongoing ISO 27001 accreditation. We met with CTO, Karen Jacks, and Information Security Officer, Tim Collinson, to learn how they have built robust […]
Protect your organisation, by thinking like a hacker – An Interview with Bridget Kenyon
Bridget Kenyon is a highly experienced member of the information security industry, holding CISO roles at a number of companies across the UK, Bridget has also been a member and editor at the Internation Organization for Standardization since 2008. Currently the Global CISO at Thales eSecurity, we met with Bridget to learn about a number […]
Building your cyber team and the underestimated role of diversity – An Interview with Vickie Guilloit
Victoria Guilloit is a leading expert in cyber security and privacy awareness, providing education and training to large brands such as Unilever, Schroders and John Lewis, to ensure that large scale change programmes work for people at all levels of the organisation. We met with Victoria to learn about: Her principles for developing a great […]
Why cyber criminals should be targeting SME’s & how AI will impact the cyber landscape – An Interview with Steve Wright
As Former (Interim) DPO to the Bank of England, and Group Data Privacy & Infosec Officer of John Lewis, Steve Wright is considered one of the leading minds in data privacy and security. He is a published author and has recently released a whitepaper on GDPR Maturity Framework. We met with Steve to learn […]
Security Target Operating Models: Key Things to Define
A member of the NCC Group Risk Management team, Shanne Edwards has helped some of the largest organisations in the financial services sector become compliant and operate more smoothly using Security Target Operating Models. The Cyber Leader’s Network asked Shanne what you should do next, after implementing a Security Target Operating Model to ensure you […]
Security Target Operating Models, People and Resourcing
Shanne Edwards is a change agent with international and national experience with implementing positive business transformations at all levels. Having worked with some of the world’s largest organisations including Vodafone, he is an expert at cyber security strategy. This time, he discusses how Security Target Operating Models can impact people and resourcing in a business. […]