Artificial Intelligence (AI) is one of the most powerful and transformative technologies of our time and it also poses significant challenges and risks for safety, security, human rights, and democracy. How can governments regulate AI to protect the public interest and values while fostering trust and innovation? I will briefly compare these two policy initiatives, […]
The CyAN Blog
Cybersecurity Advisors Network’s blog is a forum for CyAN members and friends to present their work and analysis to the broader information security community.
Enhancing Resilience: The Role of DORA in Business Continuity and Operational Resilience
In today’s regulatory landscape, navigating various regulations related to risk management can be a daunting challenge for financial institutions. However, the Digital Operational Resilience Act (DORA) offers a unique perspective. DORA not only aligns with existing best practices and regulations but also presents opportunities for financial organizations to elevate their operational resilience. In this article, […]
SolarWinds of Change – How the SEC Ruling Affects the Future of InfoSec Officers
Cybersecurity is more than a technical issue as it has legal and financial implications for companies and investors. The recent U.S. Securities and Exchange Commission (SEC) charges levied against SolarWinds Corporation and its chief information security officer illustrates the serious consequences of failing to disclose and manage cybersecurity risks and incidents in accordance with federal […]
Please Stop Overva(i)luing Buzzwords
An informed rant about how excessive industry focus on currently trendy technologies and terminology harms competitiveness and readiness in the information security world.
Cybersecurity Reinforced: Elevating Patch, Vendor, and Asset Management for Robust Defence Mechanisms
Introduction In a world where cybersecurity threats are not a matter of ‘if’ but ‘when’, the resilience of an organization’s defence mechanisms is paramount. While instances like the Cisco zero-day vulnerability serve as a reminder of the pervasive threats, they also underscore the need for a robust, all-encompassing cybersecurity strategy. For CISOs and C-suite executives, […]
Strengthening Organisational Resilience: A Comprehensive Exploration of Cybersecurity Maturity Models
Introduction October, celebrated as Cybersecurity Awareness Month globally, is a critical juncture for organisations to reflect on the escalating cyber threats that relentlessly test our defences. As we navigate an intricate digital landscape, the adoption and implementation of diverse yet complementary cybersecurity maturity models and legislations become a strategic necessity. The Imperative of Cybersecurity Maturity […]
Navigating the 2023 Cyber Landscape: A Comprehensive Guide for the C-Suite
As we delve into the intricacies of Cybersecurity Awareness Month this year, the intricate dance between evolving digital landscapes and complex cybersecurity challenges becomes ever more apparent. For every organization, especially those at the CISO, C-suite, and boardroom levels, the magnifying lens on cybersecurity has never been more potent. In the wake of sophisticated threats […]
Moving from awareness to establishing a cybersecurity culture : the under used potential of managers
CyAN member Delphine Chevallier discusses the need to do more to involve management closely in the development of cybersecurity maturity in organizations.
Stay Ahead of the Game: Outsmarting Scammers in 3 Simple Steps
Our friends at the Global Anti-Scam Alliance (GASA.org) provide a high level overview of current scam trends and techniques, and how to protect yourself.
The Imperative of Unified Cybersecurity in a Digitalised World
In our previous discussions, we delved into the multifaceted role of cybersecurity as a strategic business asset. We highlighted its pivotal role in safeguarding revenue, fortifying customer trust, and enhancing operational efficiency. In this discourse, we will dissect why unified cybersecurity has become more crucial than ever, amidst an escalating backdrop of cyber threats targeting […]