Search:
Latest Posts
With supply-chain cyber threats on the rise as a result of the pandemic, our expert panel discusses the best third-party risk management processes and how businesses should best address a partner breach Speakers include: Mitch Parker, CISO, Indiana University Health Rick Doten, VP, Information ...
Can Asset Management Firms be Data-Focused and Customer-Centric at the Same Time?
AXA Investment Managers Global Head of Customer Insight, Web Experience and Analytics Brian Stewart argues that the ...
How Covid-19 Challenged Security Programs Across Industries
Our CISO Live, US expert panel discusses battling the changing cybersecurity landscape and how to emerge stronger after ...
Keeping up With Evolving Data Privacy Regulations
Our latest InfoSec research reveals that compliance with data privacy regulations is a top priority for US businesses – ...
How Lloyd's Took Data-Driven Business from Theory to Practice
Lloyds Data Lead Simon Asplen-Taylor shares his tips on realizing the potential of data to drive business ...
Why Autonomous Cyber AI is the Next Generation of Cybersecurity
Justin Fier, Director of Cyber Intelligence and Analytics at Darktrace, explains why we need to augment the human ...
Taking an Agile Approach to Data and Analytics Success
Louise Maynard-Atem, Data Insights Lead at GBG, shares her tips on implementing agile methodology to drive innovation ...
How to Succeed in the New InfoSec Reality
Our panelists at CISO Champions Online, EU discuss the evolving role of the information security function in a ...
eBay UK is Using NLP to Transform Customer Experiences
eBay Head of UK Analytics Amit Agnihotri explains how eBay is improving customer experiences by using NLP to tap into a ...
How HSBC is Using Data to Detect Money Laundering and Fraud
HSBC is modernizing its fraud and money laundering detection capabilities by rolling out algorithms designed to ...
Forging the Path to Engineered Decision Intelligence
Our monthly panel of female data and analytics leaders discusses how to get started with engineered decision ...
Automation and The Need for Intelligence-Driven Fraud Mitigation
Cybersecurity experts recently sat down to discuss the need for organizations to better integrate their fraud detection ...
A Mission to Empower Data and Analytics Professionals: Black in Data
The co-founders of Black in Data join us to discuss why they founded a collaborative movement to promote equal ...
Facing Post-Pandemic Challenges with the Right Toolkit
Former Executive Director of Enterprise Information Strategy and Risk Management & Global Data Protection Officer ...
Our Upcoming Events
Articles
The Human Firewall: Reframing Cyber Security from Technology to Trust with ISACA's Jenny Tan
As cyber threats grow in scale and impact, organisations are being forced to rethink how they define and manage risk. In this interview, Corinium’s Vanessa Jalleh speaks with ISACA’s Jenny Tan about why resilience starts with mindset — and how cyber leaders can elevate the conversation beyond IT, ...
Cyber Choices & Consequences: The 'Would You Rather' Security Showdown with Dan Haagman
Would You Rather: Cyber Edition” – Absurd Scenarios, Real Cyber Lessons In cybersecurity, every decision has consequences—but what happens when the choices are hilariously terrible? In this special interview, Prof. Dan Haagman, CEO at Chaleit, sits down with Corinium’s Vanessa Jalleh to take on a ...
The Expanding Cyber Perimeter: As the Philippines Goes Digital, Who Keeps It Safe?
In a hyperconnected world, keeping systems secure is no longer just a technical task. It’s a national priority. So the big question is: Who’s protecting the Philippines’ digital future? From free public Wi-Fi to cloud-first policies, the Philippines is making big moves in its digital journey. ...
The Data Differentiator: How New Aim's Analytics Strategy Transformed Its E-commerce Trajectory
New Aim’s rapid rise in Australia’s e-commerce sector isn’t just a story of scale—it’s a masterclass in using data as a strategic growth engine. In this interview, Corinium’s Vanessa Jalleh speaks with Dr. Nader Chmait, New Aim’s Head of Data & Analytics, about building a high-impact function, ...
The Expanding Cyber Perimeter: As the Philippines Goes Digital, Who Keeps It Safe?
In a hyperconnected world, keeping systems secure is no longer just a technical task. It’s a national priority. So the big question is: Who’s protecting the Philippines’ digital future? From free public Wi-Fi to cloud-first policies, the Philippines is making big moves in its digital journey. ...
Reports
Tiger Analytics "Delivering Real-Time Operational Insights for PTP with Databricks Lakehouse"
Pelabuhan Tanjung Pelepas (PTP), Malaysia’s leading transshipment port, embarked on a digital transformation journey with Tiger Analytics to enhance its data capabilities. By implementing a modern data lakehouse architecture powered by Databricks, PTP aimed to centralize its data, streamline ...
ThoughtSpot's "The Data Leader's Checklist for Leveraging Agentic AI"
This ThoughtSpot report provides a comprehensive, actionable guide for data leaders looking to harness the power of Agentic AI to modernize analytics, drive innovation, and empower business users. It outlines a step-by-step checklist to transition from legacy dashboards and manual reporting to ...
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...
Unlocking the Potential of Interoperability in Federal Government
Data is the backbone of modern governance, but fragmented, siloed systems hinder the ability of federal agencies to make informed decisions, respond to crises, and drive innovation. Without interoperability, data is trapped—isolated in departments, stored in incompatible formats, and duplicated ...
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...
Podcasts
Australia’s Award-Winning Jalpa Bhavsar: Leveraging Transferable Skills to Break into Cyber
Jalpa Bhavsar shares insights on how to leverage soft skills and build technical knowledge to pursue a successful career in cybersecurity In this episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by mentor, speaker, podcaster and award-winning Cybersecurity Professional, ...
The Must-Dos for a Highly Capable Cyber Team
Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore talk about building highly capable cyber teams In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore. ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Australia’s Award-Winning Jay Hira: Key to Zero Trust Success is Strategy, Not Tools
Jay Hira shares insights on Zero Trust imperative, collaboration, and diversity and inclusion in cybersecurity In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by award-winning Cybersecurity Strategist, Jay Hira. Together they walk through Jay’s computer ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Videos
The Executive Playbook for Scalable, Secure, and Strategic AI Adoption
Ritendra Banerjee, Head of Business Insights at a major global insurer, explores what it really takes to embed AI into the DNA of a business—from data trust to cultural readiness. AI adoption is no longer a tech-side experiment—it’s a C-suite imperative. But with scale comes complexity, and with ...
Moody's: Navigating the Future with Data Webinar On-Demand
Join Erum Manzoor, Haroon Abbu, and Alaa Mousawi for this on-demand webinar, moderated by Moody's, that dives into the dynamic interplay of data governance and risk management in modern enterprises This webinar, moderated by Moody’s Steve Kleinmann and featuring thought leaders Erum Manzoor, Haroon ...
The Future of AI in Asset Management: A Conversation with Matthew Curnow of Wood
Matthew Curnow the Head of Digital Strategy, Data Management & AI at Wood explores the evolving role of AI in engineering and operations in this interview with Corinium’s Eleen Meleng. Matthew Curnow shares his thoughts on how AI is becoming a core component in various industries, including ...
Agresh Doshi: What insights in advancing data, AI and analytics are changing the public sector?
Corinium’s Vanessa Jalleh had the opportunity to speak to the Bureau of Meteorology’s Digital Development and Solutions Manager, Agresh Doshi. Agresh Doshi, the Bureau of Meteorology’s Digital Development and Solutions Manager, shares his thoughts on advancing data, AI, and analytics in the modern ...
The Future of AI in Asset Management: A Conversation with Matthew Curnow of Wood
Matthew Curnow the Head of Digital Strategy, Data Management & AI at Wood explores the evolving role of AI in engineering and operations in this interview with Corinium’s Eleen Meleng. Matthew Curnow shares his thoughts on how AI is becoming a core component in various industries, including ...