Skip to content

CyberSymbiosis

The purpose of this site is to collect and share knowledge on human-machine relationship and promote it for the benefit of both.
Main navigation
  • Home
  • Contact
  • What is CyberSymbiosis?
  • About Viktor Polic, PhD, CISSP, CISA, CRISC

Did Artificial Intelligence just save my life?

It happened in February 2021, a sad anniversary of COVID-19 pandemic. After a long locked-down winter, virus spreading […]

June 25, 2021 digital transformation

Digital Transformation Challenges: Risks, Governance, Opportunities and Game-changers?

C C Read More

Digital transformation is a process transformation. It is driven by innovation, by changing behaviors, by looking at the […]

August 10, 2020 digital transformation, Evolution of computers, information security

What have we learned about humanity over the last century?

A century ago, the World suffered devastating consequences of the 1st World War. My great-grandfather Milorad Polić was […]

July 21, 2020 digital transformation

Digital transformation challenges

I am honoured to give a keynote and moderate a panel of eminent experts in digital transformation, innovation, […]

March 11, 2019 digital transformation, information security, Talks

5G mobile networks become digital transformation enablers in 2019

C C Read More

The fifth generation (5G) mobile network technology is an umbrella term for the family of new technologies for […]

February 9, 2019 Evolution of computers, information security

Risks and benefits of Security Operations Center (SOC) in the Cloud

C C Read More

Gartner predicts: “By 2022, 50% of all SOCs will transform into modern SOCs with integrated incident response, threat […]

September 23, 2018 information security, Talks

Cybersecurity incident response guidelines for those who think they are not targets

C C Read More

Managing cybersecurity in an organization means managing risk at strategic level. While at operational level an organization might […]

September 4, 2018 information security, Talks

What is the right balance between continuous monitoring and periodic audits of IT asset management?

C C Read More

I am honored to present information security management view on information and technology asset management at  Annual Audit, […]

August 29, 2018 Talks

Is “Privacy by design” feasible?

C C Read More

Yes, of course it is! It is not however simple to design information systems with privacy in mind […]

August 20, 2018 information security

Will EU GDPR Enforce Proactive Security in the Post-“Heartbleed” “Shell Shock” World?

C C Read More

It is very disappointing for an information security professional to repeatedly discover how organizations neglect security basics. Vulnerability […]

July 10, 2018 Talks

Posts navigation

Previous1 2 3 Next
Blog at WordPress.com.
  • Home
  • Contact
Secondary navigation
  • LinkedIn
  • Twitter
  • Search

Begin typing your search above and press return to search. Press Esc to cancel.

CyberSymbiosis
Blog at WordPress.com.
  • Follow Following
    • CyberSymbiosis
    • Already have a WordPress.com account? Log in now.
    • CyberSymbiosis
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...