Simulation training in cybersecurity: scenario-based training is crucial to behaviour change 

What better method is there to train your employees for the cyber risks they face every day than cybersecurity simulation training?  Simulated training based on potential scenarios accurately emulates real world IT threats and pitfalls, whilst testing how your employees – and your organisation as a whole – deal with and report cyberattacks. When we […]

Read More
Data classification and its continued importance to data security 

Information security is not just a legal requirement, it is necessary to maintain an organisation’s reputation, trust, and profitability. Data classification is and remains a vital aspect of data security for every organisation. Evolving technology results in more ways for data to be created, shared, and stored. And while it may be easier (and cheaper) to […]

Read More
The differences between free and paid cybersecurity awareness training 

Would you implement free security software organisation wide? No? Then why would you opt for free cybersecurity awareness training?  Cybersecurity awareness training must be a staple in the development and learning for employees in each and every single industry. Cyber criminals and hackers are always looking for vulnerabilities and weak points to exploit, regardless of […]

Read More
Is cybersecurity awareness important these days?

Some think technology solves all. But even today safety technology-laden cars need a human with enough roadcraft to make them deliver all they can. Firewalls are becoming more sophisticated and AI integration into cybersecurity is more effective than ever before. But does this mean we can relax, put our feet up and forget about training […]

Read More
HR = Cybersecurity = People

HR and cybersecurity have one thing in common — people. Cybersecurity teams must work hand in hand with their HR colleagues to have any chance of success. As a cybersecurity professional, one of your key soft skills is to be a social butterfly. You strive to work across all areas of your organisation. Of course […]

Read More
A CISO’s guide to: Security awareness on a shoestring

Limited budget doesn’t mean limited information security awareness. The Project Management Triangle states you can only achieve two of the three basic project axes – quality, budget and schedule. For example, a low-quality project can be completed quickly and within budget. Similarly, sacrificing (increasing) budget means you can complete on time and to required quality. […]

Read More
A CISO’s guide to: creative employee awareness campaigns

Comms campaigns may not be your forte so take a leaf from the Internal Communication handbook to get your message across “What we’ve got here is failure to communicate.” The Captain, “Cool Hand Luke” This line from Donn Pearce’s Cool Hand Luke – the story of a recalcitrant southern states prisoner and 1967 film starring […]

Read More
A CISO’s guide to the end of year report

What should CISOs consider when reporting to the Board? Martin Leggett offers some advice.

Read More
The bigger picture – Attracting diversity in security

Attracting diversity in security Diversify and thrive Some say that the case for diversity in security no longer needs to be made. Becoming more inclusive has long since gone from being a ‘nice-to-see’ to a ‘must-have’. However, the discussion around the benefits of diversity in cybersecurity has been drowned out by a single clarion call […]

Read More
A CISO’s guide to the CEO’s difficult questions

It’s a scenario we’re all familiar with: “Good morning, Mr Bailey, please take a seat. The interview will start now.” And although confident I have researched and prepared well, I know some searching questions are coming my way. But I also have a few of my own. After all, a job interview is a two-way […]

Read More
This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy