Search:
Latest Posts
Senior cybersecurity leaders explain how blending complementary algorithms – on top of other strategies – keeps you ahead of known threats and new modes of attack By Kieran Andrieu As AI-powered attacks become faster, more sophisticated, and harder to detect using traditional methods, CISOs can no ...
Quiz: Are You Behind on AI Governance?
Governance in AI is no longer just about risk mitigation and dealing with regulators. More and more enterprises are ...
ThoughtSpot's "The Data Leader's Checklist for Leveraging Agentic AI"
This ThoughtSpot report provides a comprehensive, actionable guide for data leaders looking to harness the power of ...
Innovation Leaders Are Taking the Helm on AI Governance – Here’s Why
Enterprises are starting to recognize that robust frameworks are about more that just compliance and risk By Corinium ...
The Executive Playbook for Scalable, Secure, and Strategic AI Adoption
Ritendra Banerjee, Head of Business Insights at a major global insurer, explores what it really takes to embed AI into ...
Cybersecurity Executives Can Attend Corinium’s CISO New York Event for Free
The offer to join our must-attend gathering without a fee is open to VP-level and C-Suite leaders Corinium has opened ...
Unruly Governance Frameworks? Not on My Watch – A Surprisingly Fun Take on Data & AI Discipline
In this candid and colourful interview on data governance, Su Jella, Executive Leader, Global Awards Recipient & ...
How Malaysia’s Data Leaders Are Reimagining Analytics in 2025
"We have frameworks — but how do we bring them to life?" That single line, shared during a research call with one of ...
CDAO Financial Services & Insurance UK: Navigating the Data-Driven Transformation
As the UK’s financial services and insurance sectors undergo a profound data-driven transformation, the role of Chief ...
Built to Trust: Dr. Maruf Hossain on Embedding Responsibility into the AI Machine
Discover how responsible AI can drive innovation rather than hinder it. In this interview with Dr. Maruf Hossain, 2024 ...
Data Quality in the Spotlight: Rethinking Workflows for Reliable Analytics
In exclusive conversations with Corinium, we talked to some of the Philippines' top analytics minds who pulled back the ...
Smart Growth in AI and Data Starts with Governance
As data becomes more powerful and personal, the tension between speed and safety, between opportunity and oversight, is ...
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to ...
Built-In, Not Bolted On: Rethinking Security as a Platform
Corinium’s Maddie Abe engaged with Rahul Trikha, Director of Technology Platforms & Developer Experience at Domain, ...
Our Upcoming Events
Articles
Cyber Security in Malaysia: Shifting from Reactive to Strategic Leadership
Malaysian organisations are facing a crossroads in how they approach cybersecurity, especially in the evolving threat landscape. For leaders who oversees cyber security in a complex, data-rich ecosystem, the role of cyber security is no longer limited to compliance or technical defence—it’s become ...
7 Key Reflections from CISO Singapore 2025
CISO Singapore 2025 brought together security leaders, business executives, and innovators to explore how cyber security is evolving in an era of constant change. Across keynotes, panels, and hallway conversations, one theme was clear: cyber security is no longer just defence — it’s a business ...
Cyber Leadership in New Zealand: Where Does a CISO’s Job Really End?
One question kept surfacing while I was shaping the CISO New Zealand agenda this year: how far does a CISO’s responsibility actually stretch? I’ve mostly worked on the Australian market, so this was my first time diving into CISO New Zealand. After talking with cyber leaders across the country, I ...
From Intuition to Insight: Elevating Organisational Data Literacy with Mike Congdon
Delve into the role of data literacy in driving smarter decisions and building organisational confidence. In this interview with Mike Congdon, conducted by Vanessa Jalleh, we discuss practical strategies for engaging non-technical staff, the critical role leaders play in modelling data-driven ...
Cyber Leadership in New Zealand: Where Does a CISO’s Job Really End?
One question kept surfacing while I was shaping the CISO New Zealand agenda this year: how far does a CISO’s responsibility actually stretch? I’ve mostly worked on the Australian market, so this was my first time diving into CISO New Zealand. After talking with cyber leaders across the country, I ...
Reports
Tiger Analytics "Delivering Real-Time Operational Insights for PTP with Databricks Lakehouse"
Pelabuhan Tanjung Pelepas (PTP), Malaysia’s leading transshipment port, embarked on a digital transformation journey with Tiger Analytics to enhance its data capabilities. By implementing a modern data lakehouse architecture powered by Databricks, PTP aimed to centralize its data, streamline ...
ThoughtSpot's "The Data Leader's Checklist for Leveraging Agentic AI"
This ThoughtSpot report provides a comprehensive, actionable guide for data leaders looking to harness the power of Agentic AI to modernize analytics, drive innovation, and empower business users. It outlines a step-by-step checklist to transition from legacy dashboards and manual reporting to ...
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...
Unlocking the Potential of Interoperability in Federal Government
Data is the backbone of modern governance, but fragmented, siloed systems hinder the ability of federal agencies to make informed decisions, respond to crises, and drive innovation. Without interoperability, data is trapped—isolated in departments, stored in incompatible formats, and duplicated ...
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...
Podcasts
Australia’s Award-Winning Jalpa Bhavsar: Leveraging Transferable Skills to Break into Cyber
Jalpa Bhavsar shares insights on how to leverage soft skills and build technical knowledge to pursue a successful career in cybersecurity In this episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by mentor, speaker, podcaster and award-winning Cybersecurity Professional, ...
The Must-Dos for a Highly Capable Cyber Team
Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore talk about building highly capable cyber teams In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore. ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Australia’s Award-Winning Jay Hira: Key to Zero Trust Success is Strategy, Not Tools
Jay Hira shares insights on Zero Trust imperative, collaboration, and diversity and inclusion in cybersecurity In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by award-winning Cybersecurity Strategist, Jay Hira. Together they walk through Jay’s computer ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Videos
The Executive Playbook for Scalable, Secure, and Strategic AI Adoption
Ritendra Banerjee, Head of Business Insights at a major global insurer, explores what it really takes to embed AI into the DNA of a business—from data trust to cultural readiness. AI adoption is no longer a tech-side experiment—it’s a C-suite imperative. But with scale comes complexity, and with ...
Moody's: Navigating the Future with Data Webinar On-Demand
Join Erum Manzoor, Haroon Abbu, and Alaa Mousawi for this on-demand webinar, moderated by Moody's, that dives into the dynamic interplay of data governance and risk management in modern enterprises This webinar, moderated by Moody’s Steve Kleinmann and featuring thought leaders Erum Manzoor, Haroon ...
The Future of AI in Asset Management: A Conversation with Matthew Curnow of Wood
Matthew Curnow the Head of Digital Strategy, Data Management & AI at Wood explores the evolving role of AI in engineering and operations in this interview with Corinium’s Eleen Meleng. Matthew Curnow shares his thoughts on how AI is becoming a core component in various industries, including ...
Agresh Doshi: What insights in advancing data, AI and analytics are changing the public sector?
Corinium’s Vanessa Jalleh had the opportunity to speak to the Bureau of Meteorology’s Digital Development and Solutions Manager, Agresh Doshi. Agresh Doshi, the Bureau of Meteorology’s Digital Development and Solutions Manager, shares his thoughts on advancing data, AI, and analytics in the modern ...
The Future of AI in Asset Management: A Conversation with Matthew Curnow of Wood
Matthew Curnow the Head of Digital Strategy, Data Management & AI at Wood explores the evolving role of AI in engineering and operations in this interview with Corinium’s Eleen Meleng. Matthew Curnow shares his thoughts on how AI is becoming a core component in various industries, including ...