EN
blog-classroom

Yuri Bobbert

Insights, opinions & cases of AMS

Sort by

Blogposts

Yuri Bobbert
Academic director ISM and author of the book Improving the Maturity of Business Information Security
Opinion column

November 3, 2020

By Yuri Bobbert

Which of these 4 CISO archetypes do you deserve?

Digital & IT

Why is it that CISOs have such a low retention in firms and leave after 1-2 years? Is this because recruiters and HR professionals find it hard to discover what is actually needed and “copy paste” function profiles with the exact same requirements, rather than looking at the real need in

Opinion Research

August 21, 2020

By Yuri Bobbert

Digital risks to business, what do they cost?

Digital & IT

Analyzing Business Information Security for a data breach use case In a digital business world that is highly distributed via an eco-system, ensuring your digital assurance becomes vital. Everything needs to continuously work and Confidentially, Integrity and Auditability have to be

Opinion column

February 20, 2020

By Yuri Bobbert

Future Roles in Information Security

Digital & IT

We want to feel safe in this brave (and scary) new world we’re creating of machines, robots and artificial intelligence. Technological & political trends will definitely influence our profession. This new world will call for new jobs with new skillsets that address the future challenges

Opinion column

November 6, 2019

By Yuri Bobbert

CISO: master the Dialogue on Cyber Security Economics

Digital & IT

Over the last years, the role of Chief Information Security Officer (CISO) drastically changed. Over the last decade, I have seen this industry explode with fuzzy vendors in the cyber domain all delivering point solutions. Is this because industry strategy agencies like IDC , Gartner, and

Expertise

January 15, 2019

By Yuri Bobbert

How to keep your business safe in a digital world?

Digital & IT

  In our society more and more devices are connected to the internet. These so called Internet of things (IoT) devices are everywhere and most of the time equipped with software. Root cause analysis of cyber-attacks reveal poor-coded software in these devices. And yes, hackers use