Cybersecurity

Geopolitics is impacting the Cyber-Threat Landscape

Since Russia’s invasion of Ukraine began in early 2022, coordinated cyber attacks have emerged as part of the offensive, impacting organisations both in these countries and worldwide. In the shadow of the invasion, it has become evident that hybrid warfare is the new reality, and geopolitics and cybersecurity are inextricably linked. (Gartner)

The Evolution of Cybersecurity

Jeff, with over 15 years of experience in technology leadership, shares his transition from software engineering to a key role in cybersecurity. His perspectives on digital transformation and the evolution of cybersecurity are enlightening.

From Soldier to Security Leader

Craig’s extraordinary career spans over 15 years, beginning with military service and transitioning into the cybersecurity realm. He shares his unique path and passion for identity access management, highlighting its vital role in today’s digital landscape.

Pushing the Perimeter

The pandemic changed billions of lives in many ways. Overnight, company networks moved from a centralised corporate space, protected by layers of firewalls, anti-virus software and hardware to employees’ kitchen tables and home broadband.

Sustainability and Cybersecurity: The Unexpected Dynamic Duo of the Energy Transition

Sustainability and cybersecurity are rarely mentioned in the same sentence. Sustainability is tangible. By contrast, nearly all cybersecurity solutions fall into the background of our daily lives.

Gartner Unveils the Top Eight Cybersecurity Predictions for 2022-23

Analysts Explore the Future of Cybersecurity at the Gartner Security & Risk Management Summit, June 21-22 in Sydney

Engines of Engagement
How digital and IT leaders are evolving customer personalization securely

Organizations are increasingly seeking to offer customers compelling personalized services. However, issues like high-profile data breaches, overly intrusive digital marketing, and inaccurate customer assumptions resulting from poor data handling can all cause customer dissatisfaction and damage reputation.

The future of digital engagement in an age of compliance

Truly knowing the customer is key to marketing success today. And it’s not just about knowing their name, but understanding their true identity. The technology that makes this possible is known as customer identity and access management (CIAM).

How Geopolitics Impacts the Cyber-Threat Landscape

Since Russia’s invasion of Ukraine began in early 2022, coordinated cyber attacks have emerged as part of the offensive, impacting organizations both in these countries and worldwide.

Incentives are key to breaking the cycle of cyberattacks on critical infrastructure

The path to protecting critical infrastructure from cyberattack may lie not through new technology, but through a better understanding and shaping of incentives

Featured Sponsor

BT is a tier 1 global organisation that serves customers in more than 190 countries. Across the globe, they support multinational organisations with large-scale transformation in Data, Voice, Unified Comms, Contact Centre, Security and Cloud Services.

Virtual Clarity

Enter your details to download eBook

Download eBook
First
Last
Consent