Governance & Risk Management , Next-Generation Technologies & Secure Development , Threat Intelligence

ISMG Editors: London Summit Highlights

Discussion Outlines Key Trends and Themes
Clockwise, from top left: Anna Delaney, Tony Morbin, Mathew Schwartz and Tom Field

In the latest weekly update, four editors at Information Security Media Group discuss highlights from ISMG's in-person London Summit which took place this week, including the most concerning emerging threats if collateral damage from the Russia-Ukraine war isn't all it was reputed to be, building a cyber risk playbook that helps businesses identify actual exposure, and how stress and burnout are emerging in the workplace today.

See Also: Live Webinar | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

The editors - Anna Delaney, director, productions; Tony Morbin, executive news editor, EU; Mathew Schwartz, executive editor, DataBreachToday & Europe; and Tom Field, senior vice president of editorial - discuss:

  • The future threat landscape;
  • The art and science of translating cyber risk and loss exposure into quantifiable measures;
  • Protecting the health of our security leaders and their teams.

The ISMG Editors' Panel runs weekly. Don't miss our previous installments, including the May 13 edition discussing what have we learned from the Conti leaks and the May 20 edition discussing the case of the "Dr. Evil" of ransomware.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.