Introducing Jane – Chief Information Security Officer

I am Jane, a newly recruited Chief Information Security Officer (CISO) and every month, I talk about my job, the highs, the lows, and the innovations in between. And how all of this comes together to help keep my company safe, as well as grow my career.

Read my monthly blog posts

Catching up in Germany

How can we ensure the security of connected vehicles?

Read my November blog to find out more

Capgemini’s SOC proves itself within two weeks

How did I ensure the safety of my organization through constant monitoring of operations?

Read my October blog to find out more

Governance, Risk, and Compliance making sweet music

What did I do to protect my organization from penalties & reputational damage?

Read my September blog to find out more

Contracts, contracts, contracts

How did my organization improve the contract compliance processes in a secure manner?

Read my August blog to find out more

Uncovering the truth about fraud

How did I deal with the increased exposure to fraud while protecting my organization?

Read my July blog about fraud 

 

Responding to the escalation in ransomware attacks

With the rise in ransomware attacks, I had to take necessary steps to limit the risk to my organization. This is my 7-step response plan

Read my June blog on ransomware

 

Time to prepare for GDPR

With the new EU General Data Protection Regulation (GDPR) coming into force in May 2018, time was ticking to get our data protection and privacy policies up to scratch

Read my May blog about GDPR

 

Asking the right questions about cybersecurity

How do I ensure that my business is resilient enough? Is my organization compliant with security regulations and corporate policy? Is it possible to combine digital transformation with acceptable risks?

Read my April blog about cybersecurity

 

Bright IDaaS from Capgemini

It is very important that the right person connects to the right data at the right time. How do I ensure that the employees of my organization are accessing the right resource with the right level of security?

Read my March blog to find out more

 

Putting new apps to the security test

How I ensured that the apps were tested for vulnerabilities without impacting time to market?

Read my February Blog to find out more

 

Threat Hunting: Capgemini’s proactive approach to cyber-breaches

Even when I have deployed effective cybersecurity controls and tools, should I assume 100% security? Am I protecting data that has already been compromised?

Read my January Blog to find out more