Tag: CyAN
Kim Chandler McDonald is CyAN’s Director of APAC Operations and Policy Development
CyAN is pleased to announce that Kim Chandler McDonald has been appointed as the Director of APAC Operations and Policy Development. Kim has been with CyAN since 2019 and a board member since 2020, consistently demonstrating a strong dedication to our mission. In this new …
Weekly Digest Issue #77 – May 31, 2024
CyAN’s weekly digest of cybersecurity news from around the globe. Find the links to the full articles below. LinkedIn version and discussion available here. If there is a topic you would like to see more of, do not hesitate to get in touch! Part 1: Cybersecurity …
Navigating the Future of AI: Australia’s Path to Safe, Responsible, and Secure AI
Introduction: The integration of Artificial Intelligence (AI) in our digital world has profound implications, especially for professionals in cybersecurity, privacy, and data security. The Australian Government’s “Safe and Responsible AI in Australia consultation” interim response offers pivotal guidance in this realm. This article explores these …
Cybersecurity Year in Review 2023: Key Events, Learnings, and Takeaways
As 2023 comes to a close, it’s essential to look back at the major cybersecurity events of the year and extract crucial learnings and takeaways. This year has been marked by significant incidents that have reshaped our understanding of digital security, privacy, and cyber resilience. …
Striking a Balance between Values and Laws, Innovation and Regulation – Artificial Intelligence
The blog “The Tale of Two Approaches to Artificial Intelligence – EU AI Act & U.S. Executive Order on Safe, Secure, and Trustworthy AI” was a balanced look at the similarities and difference in approaches to AI. The divergence of approach is a manifestation of …
Resilience Building Regulations and the Financial Sector
The financial sector handles sensitive data and transactions that affect our economy and society. It is a critical sector and is vulnerable to cyberattacks. The SolarWinds, Colonial Pipeline, and Kaseya attacks to name a few, have exposed the weaknesses and gaps in our cybersecurity practices …




