The Art of War for CIO - 5 Key Artefacts of an effective Corporate Cyber Defense Doctrine

Our governments, enterprises and critical infrastructures are becoming increasingly dependent on IT in cyberspace. Refined, stealthy and persistent cyberattacks mainly focused on cyber resources and organizational infrastructures are increasingly urging the need for an efficient and effective Cyber Defense for our IT systems and for those who depend on them. Read More…

Human Centred Threat Intelligence

Phishing emails are constantly improving. Are your employees aware of these advanced phishing attacks and are they able to recognize phishing emails? If you are targeted by an advanced phishing attack, how will your organization respond and what can you do to improve your Human Centred Threat Intelligence? Read More…

6 Steps Risk Management Approach

In order to effectively manage risk a company should at least define strategic, operational, reporting and compliance objectives and should identify internal and external events that have the potential to effect the company’s operations by analyzing the workflows and processes and listing risks and causes, the extent of risk that is faced and the impact of identified risks on company’s operations. Read More…

Business Driven Cyber Defense

How to Capture, Create and Deliver Business Value with IT, in a Secure, Reliable, Cost Effective and Simple Manner? Read More…