2 min readThree components of an effective Security Risk Management programImplementing or changing an information security risk management program is not easy. But, if you have a structured approach to do it,...
3 min readLeaders role in cybersecurity managementIf you hold a management role in the cybersecurity area, the chances are high that you read about the leaders' role in cybersecurity and...