Intelligent CISO Issue 39 | Page 4

intelligent

CISO

security intelligence that transcends borders issue 39

33

33 . predictive intelligence
A perfect storm for supply chain attacks
36 . feature
The basics of backup : How to avoid disaster

44

41
. expert opinion
Why attackers continue to target the network
44 . industry unlocked
UK ’ s most popular hotel brands putting customers at risk of email fraud
Lynchpin Media and its publications look to maintain the highest standards in terms of quality of contents and images used . However , the current situation has led to some challenges with regards to photos and we apologise for any reduction in the quality of our products caused by this .

48

36

74

48 . feature
Sameer Basha , Security Consultant GCC , Check Point Software Technologies – Middle East , discusses the importance of using threat hunting to defend against attackers on a network , as well as how threat hunting is beneficial to operations and creates a resilient cyber infrastructure .
55 . intelligent technologies
62 . business surveillance
Mind the gap : Five most common weaknesses in a business ’ cybersecurity
67 . decrypting myths
Experts discuss whether passwords are still fit for purpose
71 . go phish
Todd Moore , Vice President Encryption Solutions , Thales
74 . end point analysis
Tips for implementing Zero Trust – Taking trust away from security
4 www . intelligentciso . com