Forthcoming content

A selection of articles and case studies scheduled for the new volume of Cyber Security: A Peer-Reviewed Journal, Volume 4 includes:

  • Taking risk to the edge of acceptable
    Steve P. Williamson, Director, IT Governance, Risk and Compliance, GlaxoSmithKline
  • Effectively integrating physical security technology into the operational technology domain
    Matthew Wharton, President, Strategic Accounts Guidepost Solutions
  • Users are an intelligence source: Are you leveraging them in your detection strategy?
    Tonia Dudley, Security Solutions Advisor, Cofense
  • Think like a hacker: Reducing cyber security risk by improving API design and protection
    Gerhard Giese, Senior Manager, Cloud Security Architects EMEA, Akamai Technologies
  • Non-traditional cyber adversaries: Combatting human trafficking through data science
    Danielle Borrelli, Operations Coordinator, California Cybersecurity Institute and Program Lead, Trafficking Investigations Hub and Sherrie Caltagirone, Founder and Executive Director, Global Emancipation Network
  • The complexity of performing cyber audits in the space sector along the supply chain
    Jose Ramon Coz Fernandez, GNSS Cyber Internal Auditor, European Space Agency – ESTEC, Directorate of Navigation and Vicente José Pastor Pérez, Principal Analyst Cyberspace, Supreme Headquarters Allied Powers Europe (SHAPE)
  • Risk is a result of human behaviour: Leveraging behavioural analytics to strengthen internal controls
    Arvind Mehta, Vice President Consulting Services and Jagmeet Singh, Vice President & Global Head of Finance Transformation, EXL
  • Managing stakeholder communication during a cyber crisis and preventing a reputation meltdown
    Carl Mavromichalis, Managing Director, Converso Engagement Services
  • What the market isn’t telling you about the cybersecurity skills shortage
    Karla Jobling, Director, Tatius
  • Consider the consequences: Understanding and limiting physical impacts caused by an ICS cyber-attack
    Richard Wyman, Professional Control Systems Engineer, CS 7 Consulting
  • A framework for fostering a dynamic information security culture
    Renay Carver, Operations and Technology Strategist, Veritable Associates
  • Know your suppliers: A review of ICT-supply chain risk management efforts of the US government and its agencies
    Olatunji Osunji, Technical Lead for Security Analytics and Automation, World Bank Group
  • Cheetahs, COVID-19 and the demand for crypto-agility
    Michael Thelander, Director of Product Marketing, Venafi
  • Offensive threat models against the supply chain
    Tony UcedaVélez, CEO & Founder, VerSprite
  • Cybersecurity challenges related to advanced energy and integrated microreactor systems
    Piyush Sabharwall, Advanced Heat Transport Lead at Idaho National Laboratory, et al.
  • Protecting next-generation web applications: A new approach
    Aanand Krishnan, CEO, Tala Security
  • Scaling cyber physical systems throughout the organisation
    Matt Leipnik, Sales Manager Cyber Security (Europe), Baker Hughes
  • The landscape from above: Continuous cloud monitoring for continuous assurance
    Fouad Khalil, Corporate Compliance Executive
  • Hacking to teach cyber awareness in an organisation
    Kris Martel, CISO, Emagine IT
  • Cyber leadership in an ecosystem context
    Matthew Doan, Senior Manager, Boston Consulting Group
  • Insider threat programmes: Time to hit restart
    Jadee Hanson, CISO and CIO, Todd Thorsen, Senior Manager, Security Risk and Compliance and Nathan Hunstad, Principal Security Engineer & Researcher, Code42
  • The challenge of assessing strategic cyber security risk in organisations and critical infrastructure
    Charles Harry, Associate Research Professor, School of Public Policy, University of Maryland
  • Effective cyber security principles for boards of directors
    Larry Clinton, President and CEO, Security Alliance