El Diario del CISO El Diario del CISO (The CISO Journal) Edición 26 | Page 4

Influencers It is being challenged by emerging new regulations such as GDPR, which are impacting all industry sectors, and the arrival on the scene of the new role of the DPO in many firms. Dan Lohrmann Chief Strategist & Chief Security Officer at Security Mentor, Inc The complete article is here Unmasking Cyber Fear – With Tips to Cut the FUD After more than 30 years in the security industry, I must confess, I am (sadly) still addicted to FUD. For example, one recent morning I clicked (and tweeted) these cyber headline stories: The complete article is here Guy-Bertrand Kamga Cloud Security Expert at Nokia How to define effective Cloud Security Baselines Since April 2018, I started a wonderful adventure on Peerlyst community, consisting in the promotion and support of secure and safe cloud adoption by organizations. Today, I took a moment to look behind to see what has been accomplished so far, and I realized that I released a couple of posts that can be helpful for those who are looking for tips, thoughts, experiences, etc. related to the cloud security domain. I intentionally decided to focus my posts on cloud security topics related to all the three main aspects (process, technology and people) of a cloud security strategy. The complete article is here JC Gaillard Founder and MD - @CorixPartners; What to look out for when hiring a new CISO? The traditional role of the CISO is changing. Charu Mitra Dubey Founder @Initium How Artificial Intelligence is Changing Cyber Security With over 15% of the total enterprises leveraging AI, it has become a matter of great debate whether AI is good or bad. Though AI was originally coined in 1950, it has seen an exponential growth in the past few years and people are concerned about how is it going to affect the human life. Rumours are hovering all around regarding the aspects of Artificial Intelligence. From Sophia, the bot to Alexa has caught the eyes of people making them wonder how is this field going to turn around. The complete article is here Brian Foster Senior ICS Cyber Security Engineer SECURITY PRACTICES FOR IEC 61131-3 PLC PROGRAMMING LANGUAGES PART 4: Within the industrial control systems (ICS), automation, operational technology (OT), cyber-physical systems (CPS), industrial internet of things (IIoT) and instrumentation communities many of the devices with some form of computing and logical capabilities rely on 5 primary programming languages specific to programmable logic controllers (PLCs) that are defined in IEC 61131-3 as Sequential Function Chart (SFC), The complete article is here