Skip to content
  • Sat. May 21st, 2022

Chronicles of a CISO

The world through a CISO's eyes

  • Home
  • The Open Letters..
  • Resources
    • Downloads
    • Industry Statistical & Metrics Reports
    • Diversity In The Workplace Resources
  • Subscribe
  • Contact Me
  • Search
Top Tags
  • Information Security
  • Quantum
  • Leadership
  • Critical_Reads
  • Identity
  • Highlights
  • SecurityCurrent

Latest Post

New Version of the NIST CSF Tool The Problem With The Industry Analyst Millicom Builds Transformational Identity Security Program Identity Management as a Foundation for Future-Proofing your Security What if Identity Didn’t Exist?
Commentary

New Version of the NIST CSF Tool

Feb 18, 2022 John Masserini
Commentary

The Problem With The Industry Analyst

Feb 8, 2022 John Masserini
Commentary Media Podcast

Millicom Builds Transformational Identity Security Program

Aug 3, 2021 John Masserini
Commentary Media Podcast

Identity Management as a Foundation for Future-Proofing your Security

May 21, 2021 JM
Commentary Media

What if Identity Didn’t Exist?

Jan 26, 2021 JM
  • Latest
  • Popular
  • Trending
  • New Version of the NIST CSF Tool
    Commentary
    New Version of the NIST CSF Tool
  • The Problem With The Industry Analyst
    Commentary
    The Problem With The Industry Analyst
  • Millicom Builds Transformational Identity Security Program
    Commentary Media Podcast
    Millicom Builds Transformational Identity Security Program
  • Identity Management as a Foundation for Future-Proofing your Security
    Commentary Media Podcast
    Identity Management as a Foundation for Future-Proofing your Security
  • Free NIST CSF Maturity Tool
    Commentary
    Free NIST CSF Maturity Tool
  • The First Anniversary of Chronicles of a CISO
    Commentary
    The First Anniversary of Chronicles of a CISO
  • Two-factor Authentication Is Not Dead
    Commentary
    Two-factor Authentication Is Not Dead
  • When Security Metrics Miss The Point
    Commentary
    When Security Metrics Miss The Point
  • New Version of the NIST CSF Tool
    Commentary
    New Version of the NIST CSF Tool
  • The Problem With The Industry Analyst
    Commentary
    The Problem With The Industry Analyst
  • Millicom Builds Transformational Identity Security Program
    Commentary Media Podcast
    Millicom Builds Transformational Identity Security Program
  • Identity Management as a Foundation for Future-Proofing your Security
    Commentary Media Podcast
    Identity Management as a Foundation for Future-Proofing your Security
Metrics
Commentary

When Security Metrics Miss The Point

May 9, 2019 JM

After countless years of presenting to boards, executives, and colleagues, I’ve found that I’ve developed almost a split-personality when I’m asked about what metrics to track.

Sailpoint
Commentary Media

Q&A with John Masserini, Global CISO at Millicom

May 8, 2019 JM

This is an interview with George Hulme is an internationally recognized writer who has been covering the technology and information security space for more than 20 years, with pieces appearing…

Commentary

Two-factor Authentication Is Not Dead

Apr 1, 2019 JM

I’ve had just about enough of the fear mongering and lazy ‘reporting’ that’s been in the press recently around how two-factor authentication is broken. I’m not sure about you, but…

Commentary Media

RSA Sales & Marketing Panel on Relationships

Mar 21, 2019 JM

For a number of years, I’ve had the honor of participating on the T.E.N. ISE® Sales and Marketing Breakfast panel at RSA. This year’s panel included some of my most…

Merritt Group Blog
Commentary Media

How to Personalize Your Product Pitch for CISOs

Feb 22, 2019 JM

A Q&A with John Masserini, CISO at Millicom Telecommunications This Merritt Group blog is part of an ongoing Q&A series with CISOs on preferred marketing and sales techniques, leading up…

Commentary

Free NIST CSF Maturity Tool

Jan 28, 2019 JM

In my previous post, ‘My Three Wishes for 2019’, I had wished that we all find a way to give back to the industry, even a little bit. In an…

wishes
Commentary

My Three Wishes for 2019

Dec 31, 2018 JM

It’s the end of the year and like all of you, my news feed has been filled with ‘Predictions for 2019’ to such a point that I basically ignore them.…

Identity Maturity Stack
Commentary

The Identity Maturity Calculator

Dec 19, 2018 JM

The Authentication Maturity Stack

security research
Commentary

Fahrenheit 451 – Security Research Edition

Nov 12, 2018 JM

In 1998, the US passed The Digital Millennium Copyright Act (DMCA) in an effort to enact several of the requirements of World Intellectual Property Organization (WIPO). DMCA makes it a…

Fundamentals
Commentary

The Identity Catechism: Questions every CISO should ask of their Identity program

Oct 16, 2018 JM

The evolution is underway. Our infrastructures are borderless, our critical data is cloud-based, and our users work from anyplace on the globe – or 36,000 feet above it. Our legacy…

Cyber Security antivirus
Commentary Media

SecurityWeek: Quest for Cybersecurity Metrics Fit for Business

Sep 17, 2018 JM

Developing clear, well defined cybersecurity metrics are necessary for the business lines to understand the risk they face. Therefore, it is often a challenge because technical risk doesn’t always relate…

Passwords NIST
Commentary

A Contrarian View of the NIST Digital ID Standards

Jul 19, 2018 JM

Recently, while attending a conference in DC, I was part of a discussion around the new NIST Digital Identity Guidelines (SP 800-63) and how “…it turned the password world upside…

Commentary Media

Whitehawk: 10 Rules for Cybersecurity Salespeople

Jun 26, 2018 JM

I’m posting this for two reasons.  First, it’s a great read for security vendor’s salespeople. You need to memorize these rules. Secondly, and I have to be honest, I’m pretty…

Alan Turing & diversity
Commentary

Why Diversity Matters in Leadership

Jun 24, 2018 JM

As I write this, it is the celebration of Alan Turing’s 106th birthday (June 23, 1912). As someone who wears their Geek Badge proudly, one has to wonder what the…

Profiles in Confidence
Commentary Media

Klogix: Profiles in Confidence – John Masserini

Jun 4, 2018 JM

Truly honored to be a featured CISO in the Klogix Profiles in Confidence magazine.  Feats of Strength is a business-focused information security magazine created by K logix. They provide a platform for a diverse…

Ethisphere/Opus: Risk as a Team Sport
Commentary Media

Ethisphere/Opus: Risk Management as a Team Sport

Mar 14, 2018 JM

Honored to be included in this multi-topic whitepaper on how to manage risk throughout the enterprise by partnering with your business lines. In this special Risk Management report by Ethisphere and…

Radware cybersecurity talent
Commentary Media

Radware: Places to find cybersecurity talent

Apr 5, 2017 JM

An interview with Radware around identifying cybersecurity talent in unexpected places within your enterprise. Companies are scrambling to fill cybersecurity positions. Some 41 percent of CIOs surveyed by recruiting firm…

Cyber Security antivirus
Commentary Media

SecurityWeek: Fighting CyberSecurity FUD and Hype

Mar 8, 2017 JM

An interview with SecurityWeek around how FUD permeates the cybersecurity industry and how security vendors use it to sell unnecessary products. Increasingly, vendors have come under scrutiny with the never…

Security BCP Business Continuity
Commentary Media

TechTarget: Security’s role in business continuity

Feb 27, 2017 JM

TechTarget interview around aligning Crisis Management and Business Continuity with the control structures of the organization. All CISOs have responsibilities and pressures that make the job fun, interesting and sometimes…

cybersecurity talent
Commentary Media

CSOonline: Should security pros get special H-1B visa consideration?

Feb 16, 2017 JM

An interview with CSOonline around the hiring challenges the security industry continues to face. New U.S. Attorney General Jeff Sessions may disagree about whether there is a shortage of skilled…

SecurityCurrent Biometrics User Behavior Analytics
Commentary Media

SecurityCurrent: CISOs Investigate: User Behavior Analytics

Dec 13, 2016 JM

The report includes an overview of the technology, staffing implications, recommendations for selling User Behavior Analytics (UBA) to the C-Suite and possible objections. It also features a market assessment based…

SC Magazine privileged access management ICMCP
Commentary Media

SC Magazine: Diversity, one key to solving cybersecurity job gap

Oct 5, 2016 JM

I recently had the honor of participating in an IBM/International Consortium of Minority Cybersecurity Professionals (ICMCP) event in Manhattan. This is coverage of the panel I was on which discussed…

Army of Things
Commentary

The Army of Things in an IoT World

Sep 26, 2016 JM

The Internet of Things is here.. By now, you’re probably well aware of the fate recently befallen on the Brian Krebs site KrebsOnSecurity.com. A Distributed Denial of Service (DDoS) attack…

SecurityCurrent Biometrics User Behavior Analytics
Commentary Media Podcast

SecurityCurrent: Podcast with Barmak Meftah, President and CEO AlienVault, About Threat Detection and Response

Aug 20, 2016 JM

In this conversation, MIAX Options CSO John Masserini discusses the threat detection and response space with AlienVault President and CEO Barmak Meftah. An early adopter of threat intelligence, Masserini notes…

Cyber Security antivirus
Commentary Media

SecurityWeek: Inside The Competitive Testing Battlefield of Endpoint Security

Jul 19, 2016 JM

Interview in SecurityWeek around the pros/cons of legacy antivirus endpoint and next-gen antivirus endpoint solutions. There is bad feeling between what can be described as traditional antivirus (Trad AV) and…

Posts navigation

1 2 3 4
JohnJMasseriniJohn Masserini@JohnJMasserini·
13 May

https://lnkd.in/eN7sYqT8

Reply on Twitter 1525124651696934913Retweet on Twitter 1525124651696934913Like on Twitter 1525124651696934913Twitter 1525124651696934913
JohnJMasseriniJohn Masserini@JohnJMasserini·
11 May

https://lnkd.in/gGKCHbi3

Reply on Twitter 1524416276671569920Retweet on Twitter 1524416276671569920Like on Twitter 1524416276671569920Twitter 1524416276671569920
JohnJMasseriniJohn Masserini@JohnJMasserini·
7 May

https://lnkd.in/eBtgsWkD

Reply on Twitter 1522735715909619715Retweet on Twitter 1522735715909619715Like on Twitter 1522735715909619715Twitter 1522735715909619715
JohnJMasseriniJohn Masserini@JohnJMasserini·
21 Apr

One of the best parts of working at TAG is I get to work with such ridiculously smart and creative people like Chris. Check out our Q2 TAG Cyber Quarterly to read the entire piece.
#cybersecurity https://lnkd.in/esrRJCeJ

Reply on Twitter 1517086684231385088Retweet on Twitter 1517086684231385088Like on Twitter 15170866842313850881Twitter 1517086684231385088
JohnJMasseriniJohn Masserini@JohnJMasserini·
20 Apr

https://lnkd.in/ea2vEzpy

Reply on Twitter 1516802416049627139Retweet on Twitter 1516802416049627139Like on Twitter 1516802416049627139Twitter 1516802416049627139
Load More...
Categories
  • Commentary (79)
  • Media (41)
  • Podcast (5)
  • Reading_Room (143)
Recent Tags
5G Analyst AppSec Architecture Awareness BCP Blockchain CISO Cloud CoaC COVID-19 Critical_Reads Cryptography Cybersecurity Diversity Highlights ICMCP Identity Information Security Interview IoT Law Leadership Malware Marketing Maturity Metrics mobile NIST Privacy Privileged Access Quantum Research RSA SecurityCurrent STEM Strategy UBA Vendors

You missed

Commentary

New Version of the NIST CSF Tool

Feb 18, 2022 John Masserini
Commentary

The Problem With The Industry Analyst

Feb 8, 2022 John Masserini
Commentary Media Podcast

Millicom Builds Transformational Identity Security Program

Aug 3, 2021 John Masserini
Commentary Media Podcast

Identity Management as a Foundation for Future-Proofing your Security

May 21, 2021 JM

Chronicles of a CISO

The world through a CISO's eyes

Proudly powered by WordPress | Theme: Newsup by Themeansar.

  • Home
  • Contact
  • Curated Daily Industry News
  • Cybersecurity News
  • Resources
    • Diversity In The Workplace Resources
    • Downloads
    • Industry Statistical & Metrics Reports
  • Search
  • Subscribe
  • The Daily News
  • The Open Letters to Security Vendors
  • The Reading Room
  • Contact Me