AI Didnt Break Cybersecurity — Poor Governance Did I keep hearing the same sentence lately — from boards, executives, and even seasoned security leaders: “AI changed everything. Cybersecurity just can’t keep up.” I don’t buy it. AI didn’t break cybersecurity. What…
AI Didnt Break Cybersecurity — Poor Governance Did I keep hearing the same sentence lately — from boards, executives, and even seasoned security leaders: “AI changed everything. Cybersecurity just can’t keep up.” I don’t buy it. AI didn’t break cybersecurity. What…
Governing Cybersecurity in the AI Era As AI rapidly transforms the way we work, serve customers, and compete, cybersecurity has become a top management and boardroom priority - no longer just an IT issue. It now stands as a core pillar of…
Governing Cybersecurity in the AI Era As AI rapidly transforms the way we work, serve customers, and compete, cybersecurity has become a top management and boardroom priority - no longer just an IT issue. It now stands as a core pillar of…
The Future of Cyber Leadership: Global CISO Forum 2026 Comes to Pakistan The cybersecurity landscape is evolving at breakneck speed, and the need for resilient, forward-thinking leadership has never been greater. That is why I am…
The Future of Cyber Leadership: Global CISO Forum 2026 Comes to Pakistan The cybersecurity landscape is evolving at breakneck speed, and the need for resilient, forward-thinking leadership has never been greater. That is why I am…
Bridging Compliance And Cybersecurity In Financial Reporting Although financial compliance and cybersecurity look like two separate responsibilities to many businesses, they are linked together in several ways. The U.S. Securities and…
Bridging Compliance And Cybersecurity In Financial Reporting Although financial compliance and cybersecurity look like two separate responsibilities to many businesses, they are linked together in several ways. The U.S. Securities and…
Bridging Compliance and Cybersecurity in Financial Reporting Although financial compliance and cybersecurity look like two separate responsibilities to many businesses, they are linked together in several ways. The U.S.…
Bridging Compliance and Cybersecurity in Financial Reporting Although financial compliance and cybersecurity look like two separate responsibilities to many businesses, they are linked together in several ways. The U.S.…
Global CISO Summit - Pakistan 2026 The cybersecurity landscape is evolving at breakneck speed, and the need for resilient, forward-thinking leadership has never been greater. That is why I am thrilled to share the details for the upcoming Global CISO Forum 2026 –…
Global CISO Summit - Pakistan 2026 The cybersecurity landscape is evolving at breakneck speed, and the need for resilient, forward-thinking leadership has never been greater. That is why I am thrilled to share the details for the upcoming Global CISO Forum 2026 –…
Masterclass on Governing Cybersecurity in the AI Era Originally published at pwc website , click here to read it there As AI rapidly transforms the way we work, serve customers, and compete, cybersecurity has become a top management and…
Masterclass on Governing Cybersecurity in the AI Era Originally published at pwc website , click here to read it there As AI rapidly transforms the way we work, serve customers, and compete, cybersecurity has become a top management and…
It was a privilege to address NATO leaders on the evolving threat of Cyber Terrorism. In a world without perimeters, the safety of our nations depends on more than just physical borders—it depends on the strength of our digital shields
It was a privilege to address NATO leaders on the evolving threat of Cyber Terrorism. In a world without perimeters, the safety of our nations depends on more than just physical borders—it depends on the strength of our digital shields
Uncovering Windows Security Secrets with Sami Laiho In the high-stakes world of cybersecurity, a select few possess the rare blend of deep technical knowledge and a unique ability to communicate it to everyone—from the front-line IT admin to the…
Uncovering Windows Security Secrets with Sami Laiho In the high-stakes world of cybersecurity, a select few possess the rare blend of deep technical knowledge and a unique ability to communicate it to everyone—from the front-line IT admin to the…
Incident Readiness vs Incident Response In today’s hyper-connected enterprise, cyber threats are no longer occasional disruptions—they are persistent, adaptive, and increasingly destructive.
Incident Readiness vs Incident Response In today’s hyper-connected enterprise, cyber threats are no longer occasional disruptions—they are persistent, adaptive, and increasingly destructive.
Developing Cybersecurity Leaders Through Continuous Learning: Building Skills for a Rapidly Evolving Threat Landscape Being prepared for the next big threat is a constant concern…
Developing Cybersecurity Leaders Through Continuous Learning: Building Skills for a Rapidly Evolving Threat Landscape Being prepared for the next big threat is a constant concern…
Tech Valley Cybersecurity Summit addresses current cyber threats The 4th annual Tech Valley Cybersecurity Symposium took place Tuesday at Rivers Casino in Schenectady. It brings the top cybersecurity experts and chief security…
Tech Valley Cybersecurity Summit addresses current cyber threats The 4th annual Tech Valley Cybersecurity Symposium took place Tuesday at Rivers Casino in Schenectady. It brings the top cybersecurity experts and chief security…
GenAI in 2025: Why Your CISO Needs to Be the AI Security Maestro Generative AI (GenAI) is no longer futuristic; it's already deployed across most organizations, leading use cases in data analysis, personalized chat experiences, and…
GenAI in 2025: Why Your CISO Needs to Be the AI Security Maestro Generative AI (GenAI) is no longer futuristic; it's already deployed across most organizations, leading use cases in data analysis, personalized chat experiences, and…
Weaponization of AI by Cybercriminals The Algorithmic Underworld: Peering into the Weaponization of AI by Cybercriminals The hum of servers, the silent flow of data – the digital realm, once a frontier of innovation, is increasingly becoming a battleground.…
Weaponization of AI by Cybercriminals The Algorithmic Underworld: Peering into the Weaponization of AI by Cybercriminals The hum of servers, the silent flow of data – the digital realm, once a frontier of innovation, is increasingly becoming a battleground.…
AI Cyber Attacks I had the pleasure of speaking with Channel 10 recently about one of the most pressing topics of our time: Artificial Intelligence.
AI Cyber Attacks I had the pleasure of speaking with Channel 10 recently about one of the most pressing topics of our time: Artificial Intelligence.
Identity is the new perimeter! 🛡️ In this crucial episode of the Sentinel Talk Show, we sit down with leading identity expert and author, Brian…
https://erdalozkaya.com/identity-security-masterclass/?utm_source=bluesky&utm_medium=jetpack_social
Identity is the new perimeter! 🛡️ In this crucial episode of the Sentinel Talk Show, we sit down with leading identity expert and author, Brian…
https://erdalozkaya.com/identity-security-masterclass/?utm_source=bluesky&utm_medium=jetpack_social
Building Fast While Staying on the Right Side of the Law I'm excited to share that I will be speaking at the 2025 Tech Valley Cybersecurity Symposium, hosted by LogicalNet, on October 14th! This will be my fourth year participating in the…
Building Fast While Staying on the Right Side of the Law I'm excited to share that I will be speaking at the 2025 Tech Valley Cybersecurity Symposium, hosted by LogicalNet, on October 14th! This will be my fourth year participating in the…
Hackers Behind the Code Beyond the Code: My Conversation on Leadership, Resilience, and the Human Element of Cybersecurity
Hackers Behind the Code Beyond the Code: My Conversation on Leadership, Resilience, and the Human Element of Cybersecurity
It’s time to rethink investigation as a first-class capabili
It’s time to rethink investigation as a first-class capabili
A CISOs Guide to Interview Preparation Whether you are moving into a new CISO role or pursuing your first position as a CISO, preparation is crucial. Not only must you demonstrate your technical and strategic expertise, but you must also show that you…
A CISOs Guide to Interview Preparation Whether you are moving into a new CISO role or pursuing your first position as a CISO, preparation is crucial. Not only must you demonstrate your technical and strategic expertise, but you must also show that you…
How are you staying ahead of the curve in cybersecurity? If you're a CISO or CIO wrestling with evolving threats, supply chain risks, or the cyber talent crunch, then you NEED to watch this.
How are you staying ahead of the curve in cybersecurity? If you're a CISO or CIO wrestling with evolving threats, supply chain risks, or the cyber talent crunch, then you NEED to watch this.
Building Trust and Influence: How CISOs Cultivate Positive Board Relationships Discover how CISOs can forge strong relationships with their board of directors. Learn key strategies for effective communication, aligning…
Building Trust and Influence: How CISOs Cultivate Positive Board Relationships Discover how CISOs can forge strong relationships with their board of directors. Learn key strategies for effective communication, aligning…
Catalyst for Global Tech Leadership Representing the U.S. at CIO 200 Grand Finale: It was an immense privilege and a profound honor to represent the United States as an ambassador at the recent CIO 200 Grand Finale in Egypt. This distinguished event, hosted by…
Catalyst for Global Tech Leadership Representing the U.S. at CIO 200 Grand Finale: It was an immense privilege and a profound honor to represent the United States as an ambassador at the recent CIO 200 Grand Finale in Egypt. This distinguished event, hosted by…
Practical Guide to Implementing NIST 2 The digital landscape is a stormy ocean, and every organization, regardless of size or industry, faces the threat of cyberattacks. Staying afloat requires a robust, adaptable, and well-understood cybersecurity…
Practical Guide to Implementing NIST 2 The digital landscape is a stormy ocean, and every organization, regardless of size or industry, faces the threat of cyberattacks. Staying afloat requires a robust, adaptable, and well-understood cybersecurity…