ellen0971Aug 10, 20235 min readBest Practice for Building a Cyber Security TeamIn today's hyper-connected world, where technology plays an integral role in every aspect of our lives, having a competent cyber security...
ellen0971Jul 18, 20233 min readUnderstand Cyber Security and Build Capability From Sun TzuIn the realm of cybersecurity, where digital threats are constantly evolving, the ancient wisdom of military strategist Sun Tzu can offer...
Mark WilliamsJul 5, 20233 min readBest CISO Practices: Reporting to the CEOIn today's digital landscape, where cybersecurity threats are evolving at an alarming pace, it may be best for CISOs to report directly...
Mark WilliamsJun 1, 20233 min readCyber Security and Tesla - 5 Key LessonsCyber Security and Tesla - Series Introduction By 2026/27 it will be increasingly difficult to purchase a non EV and the use case of...
Mark WilliamsMay 23, 20233 min readLearn Cyber Security from Allies Success in WW2Learn Cyber Security - Series Introduction "In the spirit of our recent ANZAC Day commemoration and the importance of learning from the...
Mark WilliamsMay 17, 20233 min readCyber Security and Competitive GamingCyber Security Lessons Series Introduction Understanding the lessons and challenges other industires face can help us be introspective...
Mark WilliamsApr 19, 20234 min readCyber Security Lessons from Mountain Bike RacingCyber Security Lessons - Series Introduction When we focus internally on our own industries we often become blinkered and fail to learn...
Mark WilliamsApr 5, 20233 min readCyber Security Basics: 7 tips to avoid a Data BreachThe frequency of Data breaches is growing. As is the news exposure they attract and business impact they cause...