This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 3
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 2
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 1
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreCISO on crosshair
This article looks into increasing liability of CISO in the industry.
read moreDigital Asset Series: Cyber Risk Management for Trustees
This articles looks into a framework to establish cyber risk management for digital asset trustees
read moreZero Days, Breaches and Reprise
This thought piece is reflected on current affairs
read moreDigital Assets: Custodian vs Trustee[]()
This articles into digital asset custodians and the importants of its cyber risk management
read moreBarracuda ESG vulnerability
This article examines the recently released vulnerability affecting Barracude ESG
read moreCase Study - MySejahtera Data Breach
This article is the case study for the MySejahtera data breach
read more