Securing Cloud Transformation

Securing Cloud Transformation Many organizations mistakenly assume that the cloud service provider is solely responsible for securing their data and applications. In reality, the responsibility for security is shared between the cloud service provider and the customer. It is crucial for organizations to understand their specific responsibilities and take steps to fulfill them. Common challenges […]

The digital divide – Safety for vulnerable people online

Ian Jenkins MA, Senior Change Consultant, CLN – previous information and risk consultant at Age UK. Spoke at the APPG (All Party Parliamentary Group) Cyber Security, alongside Dr Emma Philpott MBE, founder of UK Security Forum, and Jon France at ISC(2), looking at how cyber security can help bridge the digital divide. The ‘digital divide’ […]

Cyber Security in the Clouds and CISOs in the Boardroom – An Interview with David Lello

Having previously worked within the banking industry for almost 5 years, David Lello has worked on lots of transformative projects from internet and telephone banking, to implementing cloud transformations. Now the CISO at Burning Tree, David has helped many companies embrace new security improvement programs and adopting emerging technologies, such as the Internet of Things. […]

Law and Digital Order: Why Achieving ISO27001 Certification Is Merely The Beginning

As one of the leading legal firms in the technology space, Bird & Bird have successfully developed information security into a clear core competency and significant point of difference, as highlighted by their ongoing ISO 27001 accreditation. We met with CTO, Karen Jacks, and Information Security Officer, Tim Collinson, to learn how they have built robust […]

Security Target Operating Models: Key Things to Define

Shanne Edwards discusses the next steps after implementing a Security Target Operating Model.

A member of the NCC Group Risk Management team, Shanne Edwards has helped some of the largest organisations in the financial services sector become compliant and operate more smoothly using Security Target Operating Models. The Cyber Leader’s Network asked Shanne what you should do next, after implementing a Security Target Operating Model to ensure you […]

Security Target Operating Models, People and Resourcing

Shanne Edwards discusses how Security Target Operating Models affect resourcing and people.

Shanne Edwards is a change agent with international and national experience with implementing positive business transformations at all levels. Having worked with some of the world’s largest organisations including Vodafone, he is an expert at cyber security strategy. This time, he discusses how Security Target Operating Models can impact people and resourcing in a business. […]