Digital transformation is a process transformation. It is driven by innovation, by changing behaviors, by looking at the […]
risk management
Gartner predicts: “By 2022, 50% of all SOCs will transform into modern SOCs with integrated incident response, threat […]
Managing cybersecurity in an organization means managing risk at strategic level. While at operational level an organization might […]
I am honored to present information security management view on information and technology asset management at Annual Audit, […]
In November 2013 I have published an article in the CSO Journal titled “The quest for weak links […]
I would like to dedicate this post to my friend and colleague Dr. Eduardo Gelbstein who sadly passed […]
For organizations with fragmented security operations, for example with one unit managing operations of perimeter network security another […]
On the 1st of June 2018 at Webster University in Geneva I talked about security of IoTs. From […]
Webster University undergraduate catalog description: This course will introduce the student to the field of cybersecurity and Internet architecture. […]
The role of a Chief Information Security Officer (CISO) is not to manage technology, although information and communication […]