Tag: Strategy

IT Governance: What’s to Integrate for Life Science Industries

IT Governance: What’s to Integrate for Life Science Industries

Cybersecurity is no longer only an IT topic. It has become a governance issue, a regulatory priority, and increasingly a board level responsibility. CyAN Board Member Gergely Dzsinich will speak as a plenary speaker at ICSVC 2026 – the International Computerized System Validation Congress in 

Women in Tech Global Conference 2026

Women in Tech Global Conference 2026

Kim Chandler McDonald, Vice President of the Cybersecurity Advisors Network (CyAN), has been announced as a featured speaker at the Women in Tech Global Conference 2026. Her session titled “Designing Technology That Doesn’t Hurt People: Cyber Lessons for a Safer Digital Future” explores the intersection 

A Brief, Highly Biased Unpacking of the US’ White House Cybersecurity Strategy

A Brief, Highly Biased Unpacking of the US’ White House Cybersecurity Strategy

The US government recently unveiled its 2026 cybersecurity strategy. I had a look – draw your own conclusions.

Cyber (In)Securities – Issue 191

Cyber (In)Securities – Issue 191

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Beyond the Firewall: Why Stories Shape Cyber Decisions

Beyond the Firewall: Why Stories Shape Cyber Decisions

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Please welcome our newest member from Poland, Damian Banat

Please welcome our newest member from Poland, Damian Banat

Damian Banat is a senior Cybersecurity SME and Risk Management professional supporting regulated and complex enterprise environments as a freelance B2B contractor, with extensive experience across Information Security, GRC, Security Architecture, and IT/OT security. He specializes in designing and implementing enterprise cybersecurity frameworks aligned with 

Cyber (In)Securities – Issue 188

Cyber (In)Securities – Issue 188

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Please welcome our newest member from Barcelona, Spain, Ahmet Can Kan

Please welcome our newest member from Barcelona, Spain, Ahmet Can Kan

Ahmet Can Kan is a cybersecurity professional with hands-on experience across offensive security, digital forensics, and threat intelligence. His work focuses on understanding adversary behaviour end to end, from initial access through to impact, and translating real-world attack techniques into practical defensive improvements. Ahmet is 

Cyber (In)Securities – Issue 186

Cyber (In)Securities – Issue 186

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Beyond Compliance: Building Continuous Confidence in Risk, Governance, and Cybersecurity by Pathan Humam

Across industries, organizations are investing heavily in cybersecurity controls, compliance frameworks, and assurance programs. Yet many leadership teams still struggle to answer a simple but critical question with confidence: “What is our risk posture right now—and can we trust it?” As cyber threats accelerate, regulatory