Feature

How to implement a successful cybersecurity plan

Are you starting a cybersecurity plan from scratch? Check our list of essential steps to make it a successful one
keys / locks / security
Suzy Hazelwood
    Related:
  • Security
  • IT Leadership
Cristina Lago had been community editor at CIO UK, appearing at CIO events, the CIO 100 awards program, and case studies and profiles for the CIO UK Edition. She previously worked in the ASEAN, Middle East and Africa editions of CIO. She holds a degree in Hebrew and Israeli Studies from SOAS, University of London, and before joining IDG she worked in the arts and charity sector, where she developed a strong interest in digital transformation. Cristina is particularly keen on cybersecurity, the ethical implications of AI and the societal impact of emerging technologies.