ISSUE 60 (December 2018)
Building strategies
ISSUE 60
Issue 60 Contributors
Edward Amoroso
CEO, TAG Cyber
Jonathan Bohrer
CFO, Abacus Group
Mark Bower
CRO, Egress Software
Andrew Ginter
Vice President of Industrial Security, Waterfall Security
Sean Mason
Director of Threat Management and Incident Response, Cisco
Josh Mayfield
Director of Security Strategy, Absolute
Gadi Naor
CTO, Alcide
Vlatko Košturjak
Security Researcher
Sean Walls
Vice President, Eurofins Cyber Security

Building strategies

PDF download
Read issue 60 now
Share

Table of contents

  • How to make the CFO your best cybersecurity friend
  • Review: Specops Password Policy
  • Break out of malware myopia by focusing on the fundamentals
  • Securing our future in the age of IoT
  • Blind spots and how to see them: Observability in a serverless environment
  • There are no real shortcuts to most security problems
  • Bridging the priority gap between IT and security in DevOps
  • Are you ready? A good incident response plan can protect your organization
  • Privacy laws do not understand human error: Securing unstructured data in the age of data privacy regulations
  • The future of OT security in critical infrastructure.

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue