There are three things that will require your focus when establishing security and privacy arrangements within your institution: technology, awareness and...
Tag - AllCyberHeroes
By Edilson Lima, Security Manager at CAIS/RNP Although not something new, in recent years remote work, or home office, has become the only way to keep a lot...
By Renier van Heerden and Schalk Peach, South African National Research Network (SANReN) During the worst of the Covid-19 lockdown, we decided to run an...
Planning large-scale security awareness campaigns throws up many questions to grapple with. How can you make sure your campaign reaches the right people...
What are the biggest challenges facing CISOs for NRENs today, and how do these vary in different countries? Croatia’s Vlado Pribolšan and Denmark’s Henrik...
By Adrian Bühler, Mac System Administrator at SWITCH Let me walk you through how we do reporting, onboarding and lunch & learns in our internal campaign...
27 October 2022 – 14:00 – 15:00 CEST | Speaker: Emilio Nakamura (RNP) Evolving security and privacy culture is a challenge that requires a set of...
Proposal for a map of competencies in cybersecurity for non-ICT staff of companies and organizations
By Josu Mendívil, IT Director and CISO at the University of Deusto The degree of knowledge and awareness of cybersecurity by employees should be considered a...
Within three years, Cyprus’s newly formed academic CSIRT has already made impressive progress, even while navigating a global pandemic. CYNET’s Panayiota...
Picture the scene. You’re running a workshop at a university to improve, say, understanding of data privacy. Or you’re on site at an organisation experiencing...
This is the first-hand account of the 24 hours following the cyberattack on the University of Castilla-La Mancha, written by that university’s Director of ICT...
20 October 2022 – 16:00 – 17:00 CEST | Speaker: Melanie Volkamer (SECUSO research group, Karlsruhe Institute of Technology – KIT) In an...
By SI-CERT (Slovenian Computer Emergency Response Team) In addition to creating content and post updates on a daily basis, social media account managers often...
What are the hardest and best parts about setting up and managing a national CSIRT, and chairing TF-CSIRT? Why is the international response community so...
By Henry Hughes, Director of Security at Jisc For more than two years, Jisc has been supporting the sector to deal with a sustained increase in ransomware...
By Steve Kennett, CISO at Jisc Recently, the UK’s National Cyber Security Centre (NCSC) and Information Commissioner’s Office (ICO) have warned against paying...
By the Advanced Computing Group of the Institute of Physics of Cantabria (IFCA) (CSIC-UC) The implementation of the ISO27001 standard establishes the necessary...
by Dr John Chapman, Head of Janet policy and strategy A new UK government report highlights that senior leadership teams don’t always take cyber security...
13 October 2022 – 14:00 – 15:00 CEST | Speaker: Klaus Möller (DFN-CERT) “Introduce MFA to make your network more secure, everybody does it”, sure...
By Cynthia Wagner, Security Manager and CISO at Restena As the manager of the ISO 27001:2013 certification process at Restena, I am proud to have successfully...