In November 2013 I have published an article in the CSO Journal titled “The quest for weak links […]
ISMS
For organizations with fragmented security operations, for example with one unit managing operations of perimeter network security another […]
The role of a Chief Information Security Officer (CISO) is not to manage technology, although information and communication […]