ISSUE 50 (June 2016)
CISO challenges
ISSUE 50
Issue 50 Contributors
Raimund Genes
CTO at Trend Micro
Ron Green
Executive VP, CISO at Mastercard
Jeremiah Grossman
Chief of Security Strategy at SentinelOne
Alvaro Hoyos
CISO at OneLogin
Zoran Lalic
Senior Security Engineer at a large corporation
Saumil Shah
CEO of Net-Square
Sumedh Thakar
Chief Product Officer at Qualys
Joan Wrabetz
CTO at Qualisystems

CISO challenges

PDF download
Read issue 50 now
Share

Table of contents

  • Securing the future: Best practices for keeping corporate information safe during an M&A
  • Executive hot seat: Ron Green, Executive VP, CISO at MasterCard
  • 7 tips to get the absolute best price from security vendors
  • How CISOs can bridge the gap between their organizations’ IT and security needs
  • Risk management: Risks are lurking everywhere
  • Report: Infosecurity 2016
  • Internet of Fail: How modern devices expose our lives
  • Executive hot seat: Sumedh Thakar, Chief Product Officer at Qualys
  • Security: Missing from DevOps thinking?
  • The life of a social engineer: Hacking the human
  • What 17 years as an infosec trainer have taught me.

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue