Forthcoming content

A selection of articles and case studies scheduled for the new volume of Cyber Security: A Peer-Reviewed Journal, Volume 5 includes:

  • The human variable: Designing a security strategy for a future in flux
    Gary Sorrentino, Global Deputy CIO, Zoom
  • Staying a step ahead of your adversaries: How to build a cyber threat intelligence team capable of delivering business value
    Keith Nicholson, Head of Cyber Threat Operations, Her Majesty’s Revenue and Customs
  • Digital contact tracing: privacy vs/or efficiency
    Ieva Ilves, Advisor on Digital Policy, Office of the President of the Republic of Latvia
  • Eliminating the blind spots to get better visibility and control over your data
    Lorraine Dryland, Chief Information Security Officer, First Sentier Investors
  • Discovering CovidLock
    Chad Anderson, Sr. Security Researcher, Tarik Saleh, Sr. Malware Researcher and Sean McNee, Director of Research, DomainTools
  • Is ransomware winning?
    Chris Goettl, Senior Director of Product Management, Security, Ivanti
  • Scaling cyber physical systems throughout the organisation
    Matt Leipnik, Lead Industrial Cybersecurity Specialist, Nexus Controls, a Baker Hughes business
  • Home grown machine learning implementation for a SIRT: A use case - detecting domain generating algorithms
    Brennan Lodge
  • Post pandemic preparedness: How cloud native endpoint and workload protection will prepare you for the future
    James Alliband, Senior Product Marketing Manager & Security Strategist, VMware Carbon Black
  • Inventorying transient and distributed rail assets
    Ron Brash, Director of Cyber Security Insights · ‎Verve Industrial Protection
  • A review of experiences, lessons learned and best practices from COVID-19 apps
    Birgitte Drewes, Deputy Director, Danish Patient Safety Authority
  • Has the security professional wandered too far from addressing the basics in sound cybersecurity practices?
    Christopher Leach, Cyber Defense and Threat Hunting Instructor, INE
  • IAM in a multi/hybrid cloud environment: Can we do it better this time?
    Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union
  • Application security automation in development
    Maria Brown, Sr. Principal Cloud and Application Security Engineer, Medtronic, et al.
  • Improving operational maturity with an automation first strategy
    Bryan Christ, Senior Sales Engineer, Hitachi ID Systems
  • Case study: How COVID impacted LitRail’s cybersecurity practices
    Antanas Kedys, Head of Cyber Security, Lithuanian railways
  • How to optimise processes for IT security and compliance
    Richard Nootebos, Country Manager Benelux and Nordics, Netwrix
  • Beyond visibility: Why old networks need to learn new tricks
    Richard Peters, CISO Operational Technology, North America, Fortinet
  • Improving threat detection with a detection-development life cycle
    Augusto Barros, VP Cyber Security Evangelist, ‎Securonix
  • Tailoring your cyber threat intel programme and optimising resources
    Christa Girtz, Sr. Manager, Threat Intelligence, Global Security, General Mills
  • Exploring the value of non-technical knowledge, skills and abilities with cybersecurity hiring managers
    Lori Sussman, Assistant Professor, Department of Technology, University of Southern Maine
  • The high performing low risk mainframe: Reassess security in the context of changing operations to extinguish risk before it bursts out of control
    Mary Ann Furno, Offering Manager, Broadcom
  • Securing the public cloud estate of a digital native bank
    Avi Shua, CEO and Co-Founder, Orca Security and Thomas Hill, CISO, Live Oak Bank
  • Cybersecurity and data protection: Assessing risk, managing liability
    Peter Craddock, Local Partner - Tech & Data Law and Eline Van Bogget, Associate, NautaDutilh
  • Zero trust computing through the application of information asset registers
    Mark Brett, Visiting Fellow, Cyber Security Centre, London Metropolitan University
  • Security and safety incidents and standards
    Robert Kemp and Richard Smith, Associate Head of School and Head, Cyber Technology Institute, School of Computer Science and Informatics, De Montfort University