Cyber Resilience
Achieving Interoperable, Reliable and Secure Cyberspace: 3 Key North Atlantic (Europe, Canada and U.S.A) Strategic Cybersecurity Challenges
23/11/09 18:38
Allow me to share with you the summary of my explorative study conducted between January 2017 to May 2017 in Europe, Canada and U.S.A. I went on this journey to identify key challenges executive boards are facing in effectively and efficiently managing cyber risks in their organizations. More then 40 senior business and government executives in professional services, defense and intelligence communities contributed to this study.
We collectively identified three main strategic cybersecurity challenges:
1. Building and Maintaining Trust
2. Cross Industry Collaboration
3. Unified Information Sharing Read More…
We collectively identified three main strategic cybersecurity challenges:
1. Building and Maintaining Trust
2. Cross Industry Collaboration
3. Unified Information Sharing Read More…
The Art of War for CIO - 5 Key Artefacts of an effective Corporate Cyber Defense Doctrine
23/11/09 18:38
Our governments, enterprises and critical infrastructures are becoming increasingly dependent on IT in cyberspace. Refined, stealthy and persistent cyberattacks mainly focused on cyber resources and organizational infrastructures are increasingly urging the need for an efficient and effective Cyber Defense for our IT systems and for those who depend on them. Read More…
Human Centred Threat Intelligence
23/11/09 18:38
Phishing emails are constantly improving. Are your employees aware of these advanced phishing attacks and are they able to recognize phishing emails? If you are targeted by an advanced phishing attack, how will your organization respond and what can you do to improve your Human Centred Threat Intelligence? Read More…
6 Steps Risk Management Approach
23/11/09 18:38
In order to effectively manage risk a company should at least define strategic, operational, reporting and compliance objectives and should identify internal and external events that have the potential to effect the company’s operations by analyzing the workflows and processes and listing risks and causes, the extent of risk that is faced and the impact of identified risks on company’s operations. Read More…
Bedrijven moeten meer investeren in phishing awareness
23/11/09 18:38
Interview met Sheraz Ali, winnaar Best in Business Award van Nyenrode Business Universiteit Read More…
Cyber Resilience 360: A comprehensive approach to effectively create and execute a Cyber Resilience Mindset in organisations.
23/11/09 18:38
What measures can CIO's take to improve cyber resilience of their organizations in case of a cyber attack on its physical infrastructure layer? Read More…
Raising phishing awareness: a unique approach to efficiently and cost effectively raise phishing awareness of your employees.
23/11/09 18:38
Are you a CIO, CISO or a business executive who is looking for a efficient and cost effective way to raise phishing awareness of your employees? Read More…
Towards Cheaper and More Effective Phishing Awareness
23/11/09 18:38
During his Modular Executive MBA Business & IT, Sheraz Ali (35) developed a method to pinpoint which employees are vulnerable to phishing. It yielded him the Best in Business Award. ‘Targeted training of employees saves up to 70% of the education budget. And it’s more effective.’ Read More…
Business Driven Cyber Defense
23/11/09 18:38
How to Capture, Create and Deliver Business Value with IT, in a Secure, Reliable, Cost Effective and Simple Manner? Read More…