Magazine Button

Thought Leadership

Agile IT: The role of the CISO in combatting the risks of the ‘move fast, fail fast’ culture

Agile IT must be implemented with due caution, says Taj El-khayat, Managing Director – South EMEA at Vectra AI. Here he discusses the role of the CISO when it comes to balancing organisational agility with the need to ensure security is built into any new product/service from the ground up. GCC governments have staked their […]


Dragos expert on why the energy sector must take a proactive approach to cyberdefence

The energy sector has undergone immense digitalisation in recent years as organisations have adopted digital tools to help achieve their transition towards net zero. But this has also introduced new risks and threats which need to be addressed to stay ahead of sophisticated attackers. Phil Tonkin, Senior Director of Strategy at Dragos, talks us through […]


Australian security teams are being left under-resourced on the frontlines

With everything we know about the threat landscape, Rohan Langdon, Vice President Australia and New Zealand ExtraHop, asks how is it that over half of organizations have not had their cyber infrastructure updated in over a year-and-a-half. He tells us: “A more recent driver for executive and board-level buy-in in Australia is the move to […]


How to build a successful security awareness training programme

Neglected security awareness allows the weaknesses and threats to your organisation to remain undetected. Businesses must re-evaluate their approach to security by creating targeted, seamless training programmes to help prevent security breaches. In this interview, Andrew Rose, Resident CISO, EMEA at Proofpoint, highlights the current challenges experienced by CISOs and the sophisticated attacks they are […]


Three things business leaders should know about security

With leading businesses and military groups throughout APAC under attack from cybercriminals, Dave Russell, Vice President of Enterprise Strategy, Veeam Software, says business leaders must be at the forefront of their company’s security. A few years ago Cathay Pacific suffered a lapse in data security affecting the personal information of an estimated 9.4 million people. […]


Addressing cybersecurity debt before it’s too late

Singapore-based Vincent Goh, Senior Vice President, APJ, CyberArk, highlights the importance of raising awareness of ‘cybersecurity debt’. He tells us about solutions to solve the digital identity debt dilemma and the ‘debt trap’.  How has the pandemic increased the number of opportunities for cybercriminals to attack? The pandemic has resulted in the acceleration of digitalization in many countries in the Asia […]


How Zero Trust can streamline the challenge of corporate M&A

Steve Singer, Regional Vice President and ANZ Country Manager, Zscaler, tells us completing the complex IT integrations required by mergers and acquisitions (M&A) processes is fraught with difficulties but many of these issues can be addressed by applying Zero Trust security principles. There has been a spate of corporate mergers and acquisitions (M&A) undertaken worldwide […]


A good anti-ransomware strategy is at the heart of Digital Transformation

Mohamad Rizk, Senior Director, Technical Sales – Middle East, Russia and CIS at Veeam Software, outlines the pillars of a sound security strategy. Digital Transformation is seen as a big investment but is becoming a prerequisite for survival in the current and future landscape. Businesses are now more reliant on digital infrastructure than ever – […]


How much is enough? How to build a targeted and sustainable cybersecurity budget

Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President Sales, Europe at LogRhythm, explores what the right amount of cybersecurity is in order to mitigate priority risks and offers his best practice advice for achieving a targeted […]


How to remain cybersecure with ‘bringing your own devices’ 

Kevin Curran, IEEE Senior Member and Professor of Cybersecurity at Ulster University, discusses the stark figures associated with cyberattacks as of late and why it is therefore essential for organisations to address potential risks before implementing processes such as BYOD. Undoubtedly, the past two years have resulted in a colossal number of enterprises adopting an […]


Browse our latest issue

Intelligent CISO

View Magazine Archive