"I was pleased to see that the new journal is aimed at managers in the field to better understand the benefits of supply chain management thinking. The journal is focused on delivering these developing best practices to practicing managers. There is a vast gulf between academic’s theory and managerial practice [and] your journal should be a timely addition."
Forthcoming content
A selection of articles and case studies scheduled for the new volume of Cyber Security: A Peer-Reviewed Journal, Volume 5 includes:
-
The human variable: Designing a security strategy for a future in flux
Gary Sorrentino, Global Deputy CIO, Zoom -
Staying a step ahead of your adversaries: How to build a cyber threat intelligence team capable of delivering business value
Keith Nicholson, Head of Cyber Threat Operations, Her Majesty’s Revenue and Customs -
Digital contact tracing: privacy vs/or efficiency
Ieva Ilves, Advisor on Digital Policy, Office of the President of the Republic of Latvia -
Eliminating the blind spots to get better visibility and control over your data
Lorraine Dryland, Chief Information Security Officer, First Sentier Investors -
Discovering CovidLock
Chad Anderson, Sr. Security Researcher, Tarik Saleh, Sr. Malware Researcher and Sean McNee, Director of Research, DomainTools -
Is ransomware winning?
Chris Goettl, Senior Director of Product Management, Security, Ivanti -
Scaling cyber physical systems throughout the organisation
Matt Leipnik, Lead Industrial Cybersecurity Specialist, Nexus Controls, a Baker Hughes business -
Home grown machine learning implementation for a SIRT: A use case - detecting domain generating algorithms
Brennan Lodge -
Post pandemic preparedness: How cloud native endpoint and workload protection will prepare you for the future
James Alliband, Senior Product Marketing Manager & Security Strategist, VMware Carbon Black -
Inventorying transient and distributed rail assets
Ron Brash, Director of Cyber Security Insights · Verve Industrial Protection -
A review of experiences, lessons learned and best practices from COVID-19 apps
Birgitte Drewes, Deputy Director, Danish Patient Safety Authority -
Has the security professional wandered too far from addressing the basics in sound cybersecurity practices?
Christopher Leach, Cyber Defense and Threat Hunting Instructor, INE -
IAM in a multi/hybrid cloud environment: Can we do it better this time?
Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union -
Application security automation in development
Maria Brown, Sr. Principal Cloud and Application Security Engineer, Medtronic, et al. -
Improving operational maturity with an automation first strategy
Bryan Christ, Senior Sales Engineer, Hitachi ID Systems -
Case study: How COVID impacted LitRail’s cybersecurity practices
Antanas Kedys, Head of Cyber Security, Lithuanian railways -
How to optimise processes for IT security and compliance
Richard Nootebos, Country Manager Benelux and Nordics, Netwrix -
Beyond visibility: Why old networks need to learn new tricks
Richard Peters, CISO Operational Technology, North America, Fortinet -
Improving threat detection with a detection-development life cycle
Augusto Barros, VP Cyber Security Evangelist, Securonix -
Tailoring your cyber threat intel programme and optimising resources
Christa Girtz, Sr. Manager, Threat Intelligence, Global Security, General Mills -
Exploring the value of non-technical knowledge, skills and abilities with cybersecurity hiring managers
Lori Sussman, Assistant Professor, Department of Technology, University of Southern Maine -
The high performing low risk mainframe: Reassess security in the context of changing operations to extinguish risk before it bursts out of control
Mary Ann Furno, Offering Manager, Broadcom -
Securing the public cloud estate of a digital native bank
Avi Shua, CEO and Co-Founder, Orca Security and Thomas Hill, CISO, Live Oak Bank -
Cybersecurity and data protection: Assessing risk, managing liability
Peter Craddock, Local Partner - Tech & Data Law and Eline Van Bogget, Associate, NautaDutilh -
Zero trust computing through the application of information asset registers
Mark Brett, Visiting Fellow, Cyber Security Centre, London Metropolitan University -
Security and safety incidents and standards
Robert Kemp and Richard Smith, Associate Head of School and Head, Cyber Technology Institute, School of Computer Science and Informatics, De Montfort University