Skip to content
Chronicles of a CISO
Menu
  • Home
  • The Open Letters..
  • Cybersecurity News
    • Curated Daily Industry News
    • The Reading Room
  • Resources
    • Downloads
    • Industry Statistical & Metrics Reports
    • Diversity In The Workplace Resources
    • Free COVID-19 Activities and Resources
  • Subscribe
  • Contact Me
  • Search

Tag: Strategy

Home » Strategy
Sailpoint
Commentary / Media

Q&A with John Masserini, Global CISO at Millicom

This is an interview with George Hulme is an internationally recognized writer who has been covering the technology and information security space for more than 20 years, with pieces appearing …

CISO Strategy
Commentary / Media / Podcast

KLogix:Cyber Security Business Podcast

On this episode of Cyber Security Business, we sit down with John Masserini, CISO, Millicom, to discuss identity and access management in the current security environment. Excerpt:  Kevin West: Welcome to …

Fundamentals
Commentary

The Identity Catechism: Questions every CISO should ask of their Identity program

The evolution is underway. Our infrastructures are borderless, our critical data is cloud-based, and our users work from anyplace on the globe – or 36,000 feet above it. Our legacy …

Ethisphere/Opus: Risk as a Team Sport
Commentary / Media

Ethisphere/Opus: Risk Management as a Team Sport

Honored to be included in this multi-topic whitepaper on how to manage risk throughout the enterprise by partnering with your business lines. In this special Risk Management report by Ethisphere and …

cybersecurity
Commentary / Media

Thomson Reuters: Responses To Data Security Threats At Law Firms

Recap of a panel discussion which focused on a few key data security topics and included Mike Marsilio, director of security and compliance, DTI; Mark Connelly, CISO, Thomson Reuters; Steve …

CISO in the Boardroom
Commentary

From the War Room to the Boardroom – The true elevation of the CISO

In the aftermath of the Target breach, there has been a lot of press lately on the need for a CISO in the boardroom. The Wall Street Journal, the NY …

Fear. Uncertainty. Doubt. FUD
Commentary

FUD 2.0 – Redefining the FUD factor

The time for FUD is over… Long Live FUD… I’ve been known to say that ‘I’ve been in InfoSec since before it was cool’. After twenty years of being on …

privacy enclaves
Commentary

POA: Ensuring Privacy through Secure Enclaves

The very first piece I had published was in 2002 for a Privacy Officers newsletter discussing how secure enclaves would be beneficial to the privacy effort. Ensuring Privacy through Secure …

About

John Masserini

John Masserini

A bit of pontification, a touch of sarcasm, but mostly just sharing my experiences of a career in the wonderful world we call InfoSec. A three-time CISO who is a touch outspoken with a whole lot of opinion. More on LinkedIn...

Twitter Feed

John_MasseriniJohn Masserini@John_Masserini·
14h

New cloud security guidelines for healthcare, Understanding your insider threats, How Bitcoin is enabling a botnet, Six critical cloud challenges, and Developing an effective Vulnerability Management program.
#coac #ciso #cybersecu…https://lnkd.in/eqX92vP https://lnkd.in/eRam_xC

Reply on Twitter 1365299738929729537Retweet on Twitter 13652997389297295371Like on Twitter 1365299738929729537Twitter 1365299738929729537
John_MasseriniJohn Masserini@John_Masserini·
25 Feb

Half of all credential phishing attacks use Microsoft as a lure, Cisco issues 3 critical warnings, Building a cybersecurity awareness culture, LazyScripter targets airline industry, and celebrating black quantum scientists.
#coac #…https://lnkd.in/euYvUvb https://lnkd.in/eJb27iA

Reply on Twitter 1364925727016185856Retweet on Twitter 13649257270161858561Like on Twitter 1364925727016185856Twitter 1364925727016185856
John_MasseriniJohn Masserini@John_Masserini·
24 Feb

Initial Access Brokers pose a growing risk to enterprises, Clop malware targets executives, Critical RCE flaw in VMware ESXi, and the importance of diversity in Cybersecurity.
#coac #ciso #informationsecurity #cybersecurity https://lnkd.in/e-CH8gZ

Reply on Twitter 1364560893233668100Retweet on Twitter 1364560893233668100Like on Twitter 1364560893233668100Twitter 1364560893233668100
John_MasseriniJohn Masserini@John_Masserini·
23 Feb

Fighting file-less malware, APT31 used NSA tool, Scary things about Kubernetes and containers, Are your API's a honeypot, The evolving CISO role, and What's scarier than the SolarWinds breach.
#coac #ciso #informationsecurity #cybersecurity https://lnkd.in/e_BM6yb

Reply on Twitter 1364205197489172480Retweet on Twitter 1364205197489172480Like on Twitter 1364205197489172480Twitter 1364205197489172480
John_MasseriniJohn Masserini@John_Masserini·
22 Feb

Today’s articles include: New malformed URL prefix attack, A new macOS malware uncovered, FBI issues warning on TDoS attacks, WhatsApp moves ahead with privacy changes, and The challenges of cybersecurity hiring.
#coac #ciso #infor…https://lnkd.in/eju4FFN https://lnkd.in/ebyUS-7

Reply on Twitter 1363846348408242177Retweet on Twitter 1363846348408242177Like on Twitter 1363846348408242177Twitter 1363846348408242177
Load More...

Categories

  • Commentary (86)
  • Media (39)
  • Podcast (3)
  • Reading_Room (143)
  • RSS_Digest (136)

Recent Tags

5G AppSec Architecture Awareness BCP Blockchain CISO Cloud CoaC COVID-19 Critical_Reads Cryptography Diversity DNS email Highlights Hotwash ICMCP Identity Information Security Interview IoT Law Leadership Linux Malware Marketing Maturity Metrics mobile News_Digest NIST Privacy Privileged Access Quantum Research RSA SecurityCurrent STEM Strategy UBA Vendors
Copyright © 2021 Chronicles of a CISO – OnePress theme by FameThemes