Introducing Jane – Chief Information Security Officer
I am Jane, a newly recruited Chief Information Security Officer (CISO) and every month, I talk about my job, the highs, the lows, and the innovations in between. And how all of this comes together to help keep my company safe, as well as grow my career.
Read my monthly blog posts
Catching up in Germany
How can we ensure the security of connected vehicles?
Capgemini’s SOC proves itself within two weeks
How did I ensure the safety of my organization through constant monitoring of operations?
Governance, Risk, and Compliance making sweet music
What did I do to protect my organization from penalties & reputational damage?
Contracts, contracts, contracts
How did my organization improve the contract compliance processes in a secure manner?
Uncovering the truth about fraud
How did I deal with the increased exposure to fraud while protecting my organization?
Responding to the escalation in ransomware attacks
With the rise in ransomware attacks, I had to take necessary steps to limit the risk to my organization. This is my 7-step response plan
Time to prepare for GDPR
With the new EU General Data Protection Regulation (GDPR) coming into force in May 2018, time was ticking to get our data protection and privacy policies up to scratch
Asking the right questions about cybersecurity
How do I ensure that my business is resilient enough? Is my organization compliant with security regulations and corporate policy? Is it possible to combine digital transformation with acceptable risks?
Bright IDaaS from Capgemini
It is very important that the right person connects to the right data at the right time. How do I ensure that the employees of my organization are accessing the right resource with the right level of security?
Putting new apps to the security test
How I ensured that the apps were tested for vulnerabilities without impacting time to market?
Threat Hunting: Capgemini’s proactive approach to cyber-breaches
Even when I have deployed effective cybersecurity controls and tools, should I assume 100% security? Am I protecting data that has already been compromised?