Skip to content

CyberSymbiosis

The purpose of this site is to collect and share knowledge on human-machine relationship and promote it for the benefit of both.
Main navigation
  • Home
  • Contact
  • What is CyberSymbiosis?
  • About Viktor Polic, PhD, CISSP, CISA, CRISC

risk management

Digital Transformation Challenges: Risks, Governance, Opportunities and Game-changers?

C C Read More

Digital transformation is a process transformation. It is driven by innovation, by changing behaviors, by looking at the […]

August 10, 2020 digital transformation, Evolution of computers, information security

Risks and benefits of Security Operations Center (SOC) in the Cloud

C C Read More

Gartner predicts: “By 2022, 50% of all SOCs will transform into modern SOCs with integrated incident response, threat […]

September 23, 2018 information security, Talks

Cybersecurity incident response guidelines for those who think they are not targets

C C Read More

Managing cybersecurity in an organization means managing risk at strategic level. While at operational level an organization might […]

September 4, 2018 information security, Talks

What is the right balance between continuous monitoring and periodic audits of IT asset management?

C C Read More

I am honored to present information security management view on information and technology asset management at  Annual Audit, […]

August 29, 2018 Talks

Presentation on Vulnerability Assessment: Latest Generation of Hybrid Vulnerability Scanners – CISO Summit Middle East, Dubai 2014

C C Read More

In November 2013 I have published an article in the CSO Journal titled “The quest for weak links […]

July 3, 2018 Publications, Talks

Talk on Data Owner’s Cloud Survival and Exit Strategies – Cloud Security Alliance EMEA Congress, Edinburgh 2013

C C Read More

I would like to dedicate this post to my friend and colleague Dr. Eduardo Gelbstein who sadly passed […]

July 1, 2018 Evolution of computers, Publications, Talks

Talk on creating a Security Coordination Center at CISO 360 Congress in Lisbon

C C Read More

For organizations with fragmented security operations, for example with one unit managing operations of perimeter network security another […]

June 26, 2018 Talks

My talk on Internet of Things (IoT) security at Webster University Geneva

C C Read More

On the 1st of June 2018 at Webster University in Geneva I talked about security of IoTs. From […]

June 3, 2018 Talks

Teaching at University: CSSS 2410 Cybersecurity and Internet architecture (since 2017)

C C Read More

Webster University undergraduate catalog description: This course will introduce the student to the field of cybersecurity and Internet architecture. […]

May 29, 2018 Teaching at University

THE FIRST 100 DAYS OF THE NEXT GENERATION CISO

C C Read More

The role of a Chief Information Security Officer (CISO) is not to manage technology, although information and communication […]

March 22, 2018 Talks
Blog at WordPress.com.
  • Home
  • Contact
Secondary navigation
  • LinkedIn
  • Twitter
  • Search

Begin typing your search above and press return to search. Press Esc to cancel.

  • Follow Following
    • CyberSymbiosis
    • Already have a WordPress.com account? Log in now.
    • CyberSymbiosis
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...