Press, Media and Publications

Our recent press coverage including interviews, articles and quoted references

Publications

EIU.png

Amar Singh - Managing digital assets in a new technology landscape

 
 
financial_times_logo_1.jpg

 

 
 
EIU.png
 
 
ICAEW1_1.jpg

ICAEW – Amar Singh – How to avoid Cyber crime and bounce back after an Attack

infosec_mag_logo.png

 



Information Security Magazine – Cyber Response and Recovery – April 2015
 

 

Information Security Magazine – Encryption Under Attack – February 2015

Information Security Magazine – Sony Entertainment Fault – January 2015

Information Security Magazine – Mitigating the social Engineering – November 2014

Information Security Magazine – Sony Entertainment Fallout

Information Security Magazine – Maximise you employability 

Information Security Magazine – Future proofing strategy

Information Security Magazine – Choosing correct CISO

Information Security Magazine – Information Security Breaches

  

sc_logo_21413_345884.png

SC Magazine UK – Change passwords people can’t be bothered

SC Magazine UK – BT Customer data exposed

SC Magazine UK – Fake av apps on google play

SC Magazine UK – Hackers now offer 100% Satisfaction

SC Magazine UK – Linux Australia conference

SC Magazine UK – ICO Slammed for not fining breached show retailer

SC Magazine UK – Zero day opens cisco phones to eavesdropping

SC Magazine UK – New data privacy law could be delayed until 2016

SC Magazine UK – Kaspersky leaves users open to freak attack

SC Magazine UK – Stepping up to Sophisticated Attackers

SC Magazine UK – Develop a cyber crime emergency response unit 

 
logo_400_90_1.png

 

The Register – Security Awareness Training 

theregister.co.uk – Bod security

 

CSO_logo.png

CSO - Amar Singh - My Advice to Prime Minister Turnbull - July 2016 

 ComputerWeekly_logo.png

Computer Weekly – Communication key to risk management in security

Brighttalk_Logo.jpg

Bright Talk – CISOs v Hackers 

Bright Talk – Technology Overload

 

Shenii – Stepping up to Sophisticated Attackers

SaneBox – Complete security, privacy and control

Omertà IT – Understand changes in technology and provide a pragmatic outlook to IT Security

Computing – Security consultants – Help! I need somebody

IT Pro Portal – Hybrid CISO – The right choice for every business

Tech Touchstone – Information Security Breaches

Scribd – Cyber Resiliency

Technique Europe – Expert Opinion on IS

Scribd -Handling a data breach

Prezi – ROI on Information Security, a fresh approach

Amar Singh – Opening Keynote Dubai – June 2015