PinnedMartijn DekkerWinning the cyber endgame requires removal of the ultimate vulnerabilityMar 161Mar 161
Martijn DekkerA Note on Cyber InsuranceThere are four strategies to manage risk and given the increasing levels of information security risks, all four have become relevant.Nov 25, 2023Nov 25, 2023
Martijn DekkerThe 5 baselines any CISO must use.In our ever faster changing world, CISO’s need to know whether their security programs are keeping up with the evolving threat landscape…Jul 15, 2022Jul 15, 2022
Martijn DekkerCyberspace: a new buffer zone and the rise of the CISO Politicus.In the previous century, Internet started out as an open network, enabling scientists to exchange information. Internet nowadays is a zone…Mar 16, 2022Mar 16, 2022