Dear Cyber Security Risk Leader
There appear to forever be a constant whingeing by a certain functional leadership within the senior management of organisations. There’s at least two such post on linkedin every week from senior professionals and leaders in the Cyber Security field. This is not to say that these complaints are unwarranted or unjustified – we’ll talk about […]
Data Security and Data Governance – Siblings from the same Parents
This article was originally published on July 17, 2020 on http://www.nicolaaskham.com Cyber security is a term often interchangeably used instead of Information Security or other scope specific terms such as Data Security, IT Security or Digital Security etc. The keyword here is “Security” of information in whatever format or scope it is presented be it […]
Does your Cyber Security Rigour match the Rigour and motivation of a Hacker?
This article was originally published on Linkedin on August 31, 2016 @ https://www.linkedin.com/pulse/does-your-cyber-security-rigour-match-motivation-alexander/ This question is becoming more relevant each passing day following the wave of high profile cyber attacks and data breaches reported in the media in recent times. As we all know for every reported breach there are hundreds if not thousands of unreported […]
Office 365 Does not Eliminate SaaS Application Risks
This article was originally published on Linkedin on August 22, 2016 @ https://www.linkedin.com/pulse/office-365-does-eliminate-saas-application-risks-alexander/ There appear to be some misinformation or misconception out there about what office 365 (O365) is and what it isn’t. O365 is a cloud based subscription of Microsoft office suite of productivity tools as opposed to desktop or locally installed versions. Essentially it […]
Security – A Digital Transformation Enabler

This presentation was first published on Linkedin on August 13, 2015 @ https://www.linkedin.com/pulse/security-digital-transformation-enabler-alexander/. Event: Whitehall Media Identity Management conference. The promises of the digital new world is inextricably locked with cloud computing technologies. Cloud computing technology is central to the converging interconnecting forces of collaboration, mobility, BYOD, IoT and social enterprise. The information/data security needs and […]
Why Information Security May be Constraining Business
This article was originally published on Linkedin on August 5, 2015 @ https://www.linkedin.com/pulse/why-information-security-may-constraining-business-alexander/ The Information security function is first and foremost an information management discipline. Its main focus as we all aware is around the protection of information with particular emphasis on its confidentiality, integrity and availability. This is all well and good provided there is […]
Whitehall Media Conference – London 2015

This presentation was at the Whitehall Media conference in London in June 2015.