Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends
Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends
Inherent Risk vs. Residual Risk: The Foundation of Effective TPRM
Inherent Risk vs. Residual Risk: The Foundation of Effective TPRM
Updated NIST Cybersecurity Framework (CSF) Tool Released
The NIST CSF toolkit has been updated to reflect the new Cybersecurity Framework v2.0.
The Action That Shook An Industry
The SEC has put the executives of SolarWinds, including the CFO and CISO on notice. How will this impact the future of the security industry?
Technology Risk in the Private Equity World
New regulations and business drivers are forcing Private Equity firms to take a closer look at cybersecurity risk pre & post-acquisition.
A CISOs Guide to ESG
The term ESG has become a common parlance in the corporate world. How can a CISO leverage ESG to further their program and be better corporate citizens?
Cyber Resources For Veterans
Career and education resources for those on active duty or veterans who are looking to move into cybersecurity or S.T.E.M. careers.
The Evolving Game Of Cyber Insurance
Cyber insurance is increasingly difficult to obtain and more expensive than ever. A recent study identified the top 10 controls insurance carriers look for when determining coverage and cost. By…
The Interrupt-driven Life of a CISO
The interrupt-driven life of a CISO and how stress impacts our thought process and the changes we make to how our minds work.
Simplify Your Value Statement
In order to communicate their message quickly, Vendors need to develop a value statement that appeals to a CISO by quickly articulating how your solution reduces risk, minimizes staffing issues,…
New Version of the NIST CSF Tool
Please note: Version 2.1 of the tool was uploaded to the site on February 28, 2022, due to a formula bug in the privacy worksheet. I am quite thrilled to…
The Problem With The Industry Analyst
Thoughts on the damage caused by Research Firms to the Information Security field and why the role of the Industry Analyst must change.
Millicom Builds Transformational Identity Security Program
The perimeter is dissolving. Employees are using any device from any location for work. With limited visibility from our traditional networking and endpoint security controls, how do we protect our…
New Resource: Industry Statistics and Metrics
A collection of information security metrics and statistic resources to use when discussing the state of information security. Many of the typical suspects are here – DDoS, Ransomware, SPAM, Insider…
Identity Management as a Foundation for Future-Proofing your Security
The perimeter is dissolving. Employees are using any device from any location for work. With limited visibility from our traditional networking and endpoint security controls, how do we protect our…
What if Identity Didn’t Exist?
The concept of Identity is critical to what we do. If it didn't exist, how would it change your approach and how would you answer the question?
Cybersecurity in the age of the pandemic
An interview with The Times (UK) around the need for an effective awareness and training program to manage the rapid growth of the remote workforce.
CSNP: How Working From Home Is Changing The Business Environment
I recently had a wonderful opportunity to sit in on a panel discussing how the pandemic is going to change the way security practitioners think about protecting their organizations.
BeyondTrust: CISO Diaries
I had the honor of participating in the LinkedIn Live event on some of the scarest things I have ever heard from my security team.
CISO 101: How to Walk & Talk Like a CISO
I had an opportunity to reflect on what is takes to be a CISO, how I got here, and where I think the industry is heading.
A Few Leadership Work-From-Home Tips
With so many people now being asked to work-from-home as part of the evolving COVAD-19 precautions, I figured it was worthwhile to put together a few tried-and-true practices to keep…
Ed Talks: Kicking 3rd-Party Software Risk to the Curb
Panel discussion on third-party risk. Topics included conducting software composition analysis (SCA), assessing threats and impacts, risk-rating your inventory, and selecting the right controls.
Companies Battle Another Pandemic: Skyrocketing Hacking Attempts
An interview with the Wall Street Journal around the rapid uptick in enterprise attacks seen amongst the initial weeks of the COVID-19 outbreak.
Companies Rush to Implement Identity Systems for Remote Working
An interview with the Wall Street Journal around the need for an effective identity management solution to manage the rapid growth of the remote workforce.
Diversity Resources to Make a Change
In holding myself accountable to my own call-to-action, I have dedicated a page to share all of the diversity-centric resources I have collected over the years. From How-To guides to…