Let’s take a look at some specific sources for cybersecurity controls. They will become the raw material for meeting your cybersecurity program goals and managing risk. There are Many Sources…
There’s no easy answer to the question “How much should we spend on cybersecurity?” But, because the Federal Trade Commission (FTC) defines “reasonable” cybersecurity in such a way that you…
It takes careful thought and disciplined execution to assemble the right people in the correct positions to support your cybersecurity program. Let’s go through the process of discovering who you…
The person in charge of your cybersecurity program is often called the Chief Information Security Officer, or CISO. About the CISO Title, and Why It Matters The CISO title is…
Let’s review the typical functions of a cybersecurity program. These functions are often performed by separate teams in very large organizations or by a single team in smaller ones. Some…