Recent Posts

CyAN’s Position on the Recommendations of the High-Level Group on Access to Data for Effective Law Enforcement

CyAN’s Position on the Recommendations of the High-Level Group on Access to Data for Effective Law Enforcement

CyAN opposes recommendations made by the European Commission’s High-Level Group on Access to Data for Effective Law Enforcement (HLG).

Cyber (In)Securities – Issue 153 

Cyber (In)Securities – Issue 153 

You can download this edition by clicking the three dots icon on the bottom right and selecting Download PDF File. To enlarge the view, click the fullscreen icon on the bottom right. All article titles inside the flipbook are clickable links.

Hack the Planet? No. Just Hack the Tap: What exposed water systems tell us about the state of cybersecurity around the world

Hack the Planet? No. Just Hack the Tap: What exposed water systems tell us about the state of cybersecurity around the world

Final thought About the Author: Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions. She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.

Board Member Spotlight: Adj. Prof. Dr. Greg Dzsinich, LLM, CIPP/E

Board Member Spotlight: Adj. Prof. Dr. Greg Dzsinich, LLM, CIPP/E

One idea that continues to guide his leadership comes from his time at Microsoft. When he joined the company in 2008, he was struck by a powerful metaphor. If we sit in one boat, we must not only row well. We must also remain in 

“What happens to Heroes?” EPISODE #6: The Unsung Heroes of the digital world by Didier Annet

“What happens to Heroes?” EPISODE #6: The Unsung Heroes of the digital world by Didier Annet

The Psychological Impacts of Cyberattacks What I will call the “Heroes” Let’s Rewrite the Story of a Cyberattack – Alternate History of a winning scenario Excerpt From the Interview Typical identification factor: “Right reflexes, right roles — from click to crisis” About the Author Didier 

Cyber (In)Securities – Issue 152 – Snapshot Edition

Cyber (In)Securities – Issue 152 – Snapshot Edition

You can download this edition by clicking the three dots icon on the bottom right and selecting Download PDF File. To enlarge the view, click the fullscreen icon on the bottom right. All article titles inside the flipbook are clickable links.

CyAN Mentorship Wrap-Up – 2025-1

CyAN Mentorship Wrap-Up – 2025-1

CyAN is nearing the end of its spring 2025 mentorship programme. We extend a sincere thank you to our members who have agreed to contribute to the development of new talent entering the information security sector: Saba Bahgeri (Australia), Mohammed Shakil Khan (UAE), Mathew Nicho 

Week 22 – High severity vulnerability affects Versa Concerto

26 May – 01 June 2025 Our new CVE of the Week is high severity vulnerability, CVE-2025-34027, has been identified and is making waves across the cybersecurity landscape. It affects Versa Concerto, an orchestrator and interface to configure and monitor Versa OS devices in Secure 

Cyber (In)Securities – Issue 151 – Snapshot Edition

Cyber (In)Securities – Issue 151 – Snapshot Edition

You can download this edition using the download icon at the bottom. To enlarge the view, click the fullscreen icon on the bottom right. All article titles inside the flipbook are clickable links.

New Podcast – Return of the Bride of Terrorism, With Bjørn Ihler

New Podcast – Return of the Bride of Terrorism, With Bjørn Ihler

Part III in our series on violent extremism and terrorism