Posts categorized: Guest Blog

13 September 2018 / Guest Blog, Leadership Development / Natasha McCabe

Dealing with the tactical aspects of the function during your first weeks in the job doesn’t have to be detrimental to the success of a longer-term transformative agenda Much has been written about the Chief Information Security Officer and how to best… Read more »

Read More

30 August 2018 / Guest Blog / Laura Peytavin

As long as intentionality remains an exclusively human trait of which AI is deprived on the global scale, the human factor will remain cybersecurity’s weakest link. Artificial Intelligence is helping both attackers and their targets – shifting the natu… Read more »

Read More

6 March 2018 / Guest Blog / Rupert Brown

Welcome to the final part of my series of articles that have been looking at the challenges that GDPR poses and what can be done to mitigate them. At the time of writing (Mid March 2017) we need to recognise that a) No major organisation is GDPR compli… Read more »

Read More

20 February 2018 / Guest Blog / Rupert Brown

Welcome to the penultimate part of this series of articles which will look at a few corner cases and left over thoughts before I wrap up with a summary next time. Let’s start with a tale from the first job I had after I graduated which was building hot… Read more »

Read More

6 February 2018 / Guest Blog / Rupert Brown

Two events this week have crystallised my thoughts for this part of the GDPR blog. < Note: This article was first published on Linkedin Pulse on 1st March 2017 and can be found here> Firstly I visited a RegTech conference and was buttonholed in t… Read more »

Read More

23 January 2018 / Guest Blog / Rupert Brown

Welcome to Part 5 of this journey through some of the technical and engineering challenges that companies must address in order to satisfy GDPR requirements. In the previous parts of this series the key notions of comprehensive and coherent identity +… Read more »

Read More

9 January 2018 / Guest Blog / Rupert Brown

In the previous article in this series, I looked at the roles of Controller and Processor and the core issue of who is responsible for managing the range of identities and functions within an organisation vs who manages the technical mechanisms that au… Read more »

Read More

5 December 2017 / Guest Blog / Rupert Brown

Part 3 of this series considers two angles on the issue of Controllers and Processors Firstly firms need to consider the tricky technical subject of Identities and Roles. It is imperative that the path from the foundational identity management systems… Read more »

Read More

21 November 2017 / Guest Blog / Rupert Brown

Welcome to the second of my commentaries on GDPR which looks at the challenges and opportunities of “engineering” a robust and sustainable solution to its broad operational sphere of influence Paragraph 2 of the GDPR regulation provides the top level s… Read more »

Read More

7 November 2017 / Guest Blog / Rupert Brown

Welcome to a series of articles I shall be posting to cover some the key facets of GDPR and how they might be addressed using engineering techniques rather that rather the more simplistic approaches of hoped for policy declarations and attestation that… Read more »

Read More