Intelligent CISO Issue 83 | Page 3

6 . news
Latest news round-up
15 . latest intelligence
Latest whitepapers from Proofpoint and Veeam

ISSUE 83 contents

18
. cyber trends
How cybercriminals exploit QR codes and how to stay safe
22 . infographic
Fraud attempts with deepfakes have increased by 2137 % over the last three years
24 . threat updates
UK , Switzerland , China and North Korea
27 . editor ’ s question
How can CISOs in the education sector balance the need for open access to information with the growing risks of cyberattacks and data breaches ?
33 . predictive intelligence
How threat actors use C2 and data exfiltration as part of double extortion
41 . expert opinion
The skills CISOs need to lead beyond cybersecurity
44 . industry unlocked
Strengthening telecom cybersecurity : Expert strategies for resilient networks
55 . intelligent technologies
63 . business surveillance
The five levels of cybersecurity maturity : Where do you fit ?
67 . go phish
Matt Hillary , CISO , Drata
70 . secure horizons

International Women ’ s Day 2025 : Honouring women in cybersecurity cover story end-user insight

The education sector is one of the most prone to cyberattacks in the world , heightened in recent years due to the fast-paced , ever-evolving technological field . Sarah Lawson , CISO and Deputy CIO for the University College London ( UCL ), has been at the institution for three years and with 20 years ’ experience in cybersecurity under her belt , she offers her advice for those in education cybersecurity .

feature

In an age of increasing cyberthreats and sophisticated attacks , traditional perimeter-based security is no longer enough . In this feature , three industry experts from Protegrity , Xalient and 11:11 Systems explain how organisations can implement Zero Trust effectively without compromising user experience or creating unnecessary complexity in their IT infrastructure .

feature

With Williams Racing , one of the oldest and most renowned F1 teams , facing an immense challenge in protecting its valuable intellectual property it turned to Keeper Security for a reliable and secure password management solution .

51

36

48

72 . end point analysis
Managing the third-party blindspot for DORA
WWW . INTELLIGENTCISO . COM 3