20 February 2018 / Guest Blog / Rupert Brown
Welcome to the penultimate part of this series of articles which will look at a few corner cases and left over thoughts before I wrap up with a summary next time. Let’s start with a tale from the first job I had after I graduated which was building hot… Read more »
15 February 2018 / JC's Column / JC Gaillard
GDPR has been at the forefront of privacy, security, risk and controls discussions in many firms since last year. Many are in the midst of large scale “compliance” programmes, spending enormous amounts with the view of achieving something by the 25th o… Read more »
6 February 2018 / Guest Blog / Rupert Brown
Two events this week have crystallised my thoughts for this part of the GDPR blog. < Note: This article was first published on Linkedin Pulse on 1st March 2017 and can be found here> Firstly I visited a RegTech conference and was buttonholed in t… Read more »
1 February 2018 / Leadership Development / JC Gaillard
Through this series, we have examined how an incoming CISO can create the conditions to truly make a difference in their new job. Of course, as we stated in the introductory article , all companies are different from one another and so are most individ… Read more »
23 January 2018 / Guest Blog / Rupert Brown
Welcome to Part 5 of this journey through some of the technical and engineering challenges that companies must address in order to satisfy GDPR requirements. In the previous parts of this series the key notions of comprehensive and coherent identity +… Read more »
18 January 2018 / Leadership Development / JC Gaillard
This is the point when you really get stuck in. By now, you would have been in the new CISO job for about 2 months and it should start to feel less and less like a new job. Of course, this is not really about 100 days, and you should also start to real… Read more »
9 January 2018 / Guest Blog / Rupert Brown
In the previous article in this series, I looked at the roles of Controller and Processor and the core issue of who is responsible for managing the range of identities and functions within an organisation vs who manages the technical mechanisms that au… Read more »
4 January 2018 / JC's Column / JC Gaillard
People simply trust other people This excellent November piece from McKinsey on cyber security deserves a comment (“A Framework for Improving Cybersecurity discussions within Organizations” – Jason Choi / Harrison Lung / James Kaplan). The visualizatio… Read more »
14 December 2017 / Cyber Security Community / Corix Partners
Corix Partners is active at a number of levels in the wider cyber security community in the UK and abroad. This is a summary of the activities which we have undertaken during Q4 2017. Corix Partners are delighted to announce that, since… Read more »
5 December 2017 / Guest Blog / Rupert Brown
Part 3 of this series considers two angles on the issue of Controllers and Processors Firstly firms need to consider the tricky technical subject of Identities and Roles. It is imperative that the path from the foundational identity management systems… Read more »
