In the summer of 2012, Mat Honan’s story of being completely hacked became my burning platform to up my password game. As a financial executive in your organization who wants to be seen as a great…
I previously outlined three strategies for detecting intruders on your network without the need for a large capital expense for specialized systems. In fact, you don’t even need a managed…
Organizations can do a good job of detecting intruders who have infested their data network without buying and operating an expensive commercial network intrusion detection system. You don’t even have to…
Let’s take a look at some specific sources for cybersecurity controls. They will become the raw material for meeting your cybersecurity program goals and managing risk. There are Many Sources…
There’s no easy answer to the question “How much should we spend on cybersecurity?” But, because the Federal Trade Commission (FTC) defines “reasonable” cybersecurity in such a way that you…
It takes careful thought and disciplined execution to assemble the right people in the correct positions to support your cybersecurity program. Let’s go through the process of discovering who you…
The person in charge of your cybersecurity program is often called the Chief Information Security Officer, or CISO. About the CISO Title, and Why It Matters The CISO title is…
Did you know that leaning into your cyber risks can be a source of competitive advantage? Here’s a stunning data point that makes my case. This year, the NTT Group (Japanese AT&T) released…
Last Thursday, I sat down with Ray Pompon (F5) and Michael Hamilton (Critical Informatics) to discuss a recent report on “The Evolving Role of CISOs”. Among many things, we covered:…
Everyone, you are invited to join us this Thursday, November 16th at 10am Pacific Time, for a great webinar on “The Evolving Role of CISOs and Their Importance to the…