Blogs & Podcast

Dear Cyber Security Risk Leader

There appear to forever be a constant whingeing by a certain functional leadership within the senior management of organisations. There’s …

Data Security and Data Governance – Siblings from the same Parents

This article was originally published on July 17, 2020 on  http://www.nicolaaskham.com Cyber security is a term often interchangeably used instead …

Does your Cyber Security Rigour match the Rigour and motivation of a Hacker?

This article was originally published on Linkedin on August 31, 2016 @ https://www.linkedin.com/pulse/does-your-cyber-security-rigour-match-motivation-alexander/ This question is becoming more relevant each passing …

Office 365 Does not Eliminate SaaS Application Risks

This article was originally published on Linkedin on August 22, 2016 @ https://www.linkedin.com/pulse/office-365-does-eliminate-saas-application-risks-alexander/ There appear to be some misinformation or misconception …

Security – A Digital Transformation Enabler

This presentation was first published on Linkedin on August 13, 2015 @ https://www.linkedin.com/pulse/security-digital-transformation-enabler-alexander/. Event:  Whitehall Media Identity Management conference. The promises …

Why Information Security May be Constraining Business

This article was originally published on Linkedin on  August 5, 2015 @ https://www.linkedin.com/pulse/why-information-security-may-constraining-business-alexander/ The Information security function is first and foremost …

Whitehall Media Conference – London 2015

This presentation was at the Whitehall Media conference in London in June 2015. Like this:Like Loading…

Cyber Security Risk Memoirs