Search:
Latest Posts
Adenike Cosgrove, Proofpoint International’s Senior Director of Product Marketing, argues that the risk of numerous cyber threats can be significantly reduced by improving email security – the number one ransomware threat vector Global cybersecurity spending is projected to reach US $302 bn by ...
How will Ransomware Evolve in 2022?
At CISO London 2021, our panel of industry experts discussed how CISOs should approach the threat of ransomware in the ...
Time for a Mesh Start? How Vistaprint Reimagined Its Data Architecture as a Data Mesh
Sebastian Klapdor, EVP and Chief Data Officer at Vistaprint, explained how Vistaprint scaled the benefits of its data ...
Zero Trust: Cutting Through the Spin
CISOs are increasingly implementing zero-trust initiatives as they modernize their security architecture – but how much ...
Secure Digital Transformation and Data Democratization Top Agenda at CISO London
As CISO and Head of Data Governance for insurance company esure, Stephen Owen had a golden opportunity to empower his ...
Quantum Computing is Poised to Revolutionize Cryptography
In this week’s episode of the Business of InfoSec Podcast, we chat to Voya Financial CISO and author Raj Badhwar about ...
Will APIs be the Greatest Cyber Threat to Your Business in 2022?
Digital transformation and the shift to hybrid working triggered a rapid rise in the use of APIs. Now, the associated ...
Victoria van Roosmalen: Inspiring Women to Defy Expectations
Ahead of appearing at CISO Europe, Victoria van Roosmalen shares her experience of success in a traditionally ...
Karen Holmes: Cybersecurity Teams Must ‘Automate or Die’
In this episode of the Business of InfoSec Podcast TrueBlue CISO and SVP Karen Holmes explains why she is putting ...
Exploring the Reality of Ransomware Attacks in 2021
In this discussion from CISO Champions Live, US, our panel of experts discusses how to mitigate the risks associated ...
Building an Organization-Wide Culture of Data Security
To mark cybersecurity awareness month we asked leading CISOs about how they are communicating cybersecurity risk to ...
Taking Data Strategy from Theory to Practice
Rogayeh Tabrizi, CEO and co-founder of data science firm Theory + Practice shares her advice on creating a data ...
My Neighbor Hacked My Toothbrush: The Cybersecurity Implications of IoT
University of Edinburgh Deputy CISO Garry Scobie joins us on the Business of InfoSec Podcast to discuss the ...
Fighting Back Against Ransomware as a Service: Jules Pagna Disso
Ransomware has become a successful service-based business model, what follows is diversification, innovation, and ...
Our Upcoming Events
Articles
Why Trustworthy AI Starts With Better Decisions
Canadian author and the founder of FedEthics Inc. Celio Oliveira is one of the leading voices about Ethical AI worldwide. In this article, he argues that responsible AI governance must begin with decision quality, constitutional values, and the discipline to challenge data before acting on it. For ...
Navigating the Critical Data Centre Energy Transition
As Australia’s data centre sector enters a new growth phase, energy has become a critical strategic lever. In this conversation, Liam McWhirter, General Manager, Enterprise and Strategic Partners at Origin, joins Corinium’s Parveen Sekhon to unpack how energy partners and operators can work ...
Not a Breach of Trust, but a Test of It: Insider Risk Today
Over the past year, there have been a few cyber‑related news stories that have quietly cut through the cyber security community, especially the public sector. One involved an NSW Treasury staff member allegedly exfiltrating a large volume of sensitive documents. Another, less locally visible but ...
Is Traditional AppSec Dead in an AI-Driven World? Insights from Kmart's DevSecOps Leader
Corinium’s Maddie Abe engaged with Kalpana Venkatesan, Senior DevSecOps Engineer of Kmart, to explore what AppSec demands from AI. Today applications are no longer written purely by humans. Traditional AppSec, built around manual code reviews, static rules and periodic scans, was never designed for ...
Not a Breach of Trust, but a Test of It: Insider Risk Today
Over the past year, there have been a few cyber‑related news stories that have quietly cut through the cyber security community, especially the public sector. One involved an NSW Treasury staff member allegedly exfiltrating a large volume of sensitive documents. Another, less locally visible but ...
Reports
Sprawling Towards Exposure
Investigating Cloud Permission Risks for CISOs in Southeast Asia Cloud environments now handle the majority of enterprise workloads, but this shift has introduced a critical vulnerability: excessive permissions. As organisations adopt multi-cloud infrastructure at speed, many are accumulating ...
The Rise of Logical Data Management - An O'Reilly Book (Compliments of Denodo)
An Essential Data Strategy for Transforming Your Business in the Age of AI O’Reilly’s The Rise of Logical Data Management, by Christopher Gardner, explains what’s necessary to enable true self-service data access and 24/7 AI-ready data. This comprehensive guide explains how logical data management ...
ThoughtSpot's "9 Data and AI Trends for 2026"
Data and analytics leaders are navigating one of the most transformative periods the industry has ever seen. As AI accelerates innovation and executive expectations intensify, organisations must modernise their capabilities while managing legacy systems, workforce concerns, and growing trust, ...
From Reactive to Proactive: ANZ Security Leaders Dive Into Exposure Management
Traditional vulnerability management has become a compliance exercise rather than a security outcome. Security teams are drowning in CVE notifications, most of which have no bearing on actual risk. While scheduled scans generate thousands of alerts, attackers exploit the gaps between siloed tools ...
ThoughtSpot's "9 Data and AI Trends for 2026"
Data and analytics leaders are navigating one of the most transformative periods the industry has ever seen. As AI accelerates innovation and executive expectations intensify, organisations must modernise their capabilities while managing legacy systems, workforce concerns, and growing trust, ...
Podcasts
Australia’s Award-Winning Jalpa Bhavsar: Leveraging Transferable Skills to Break into Cyber
Jalpa Bhavsar shares insights on how to leverage soft skills and build technical knowledge to pursue a successful career in cybersecurity In this episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by mentor, speaker, podcaster and award-winning Cybersecurity Professional, ...
The Must-Dos for a Highly Capable Cyber Team
Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore talk about building highly capable cyber teams In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore. ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Australia’s Award-Winning Jay Hira: Key to Zero Trust Success is Strategy, Not Tools
Jay Hira shares insights on Zero Trust imperative, collaboration, and diversity and inclusion in cybersecurity In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by award-winning Cybersecurity Strategist, Jay Hira. Together they walk through Jay’s computer ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Videos
Data Governance That Delivers: Focus, Value, Impact: Insights from Lucy Bailey
Lucy Bailey, a data governance leader, shares insights on how data governance delivers focus, value, and impact . In this insightful interview, Corinium's Vanessa Jalleh sat down with Lucy Bailey to explore the evolving role of Data Governance in modern organisations. Lucy shares her perspective on ...
Speaker Spotlight: Erum Manzoor
Erum Manzoor, Senior Vice President at Citi addresses balancing automation with human oversight at AI Risk and Compliance Online. To watch Erum's uncut participation from AI Risk and Compliance Online: Press Here. Topics covered in this conversation include: How will the EU AI Act & U.S. ...
Speaker Spotlight: Bipin Chadha
Bipin Chadha, Senior Vice President Data Scientist at CSAA explores the Future of Agentic AI in the Financial Services industry. To watch Bipin's uncut presentation from Agentic AI in Financial Services Online 2025: Press Here. Topics covered in this conversation include: How are autonomous AI ...
Speaker Spotlight: Leonard Hawkes
Leonard Hawkes, Software Engineer at JP Morgan Chase explores unmasking bias involved with AI in the financial services industry. To watch Leonard's uncut presentation from Agentic AI in Financial Services Online 2025: Press Here. Leonard Hawkes Jr. explores the future of AI-driven financial ...
Speaker Spotlight: Bipin Chadha
Bipin Chadha, Senior Vice President Data Scientist at CSAA explores the Future of Agentic AI in the Financial Services industry. To watch Bipin's uncut presentation from Agentic AI in Financial Services Online 2025: Press Here. Topics covered in this conversation include: How are autonomous AI ...
