Skip to main content

Posts

Showing posts from 2017

Featured

How Security Architecture Supports Business Drivers

The Enterprise Information Security Architect is a crucial position within IT security and is often challenging and stressful. The job forms the “glue” that bridges the technological aspects of security and business drivers. The architect must have a solid understanding of the business architecture to design the best security systems possible that not only do not impede the business but enable business opportunities.  Also, the position must exhibit a management presence to articulate to senior executives the conceptual architecture and how it will impact business operations.
Through the many years as a security practitioner, I find organizations who are using existing security controls that are not effective. When engaged in these projects part of the risk assessment conducted is determining if there is sufficient protection for information that should be shared with employees, customers, business partners, and the general public. The risk assessment is a crucial step when designing…

Will 2018 Be a Year Addressing the Skills Gap and Cloud Security?

Things to Consider When Calculating the Return on Security Investment

Security Awareness Tips for The Holidays

Filling the Cybersecurity Skills Gap With Freelance Security Professionals

Security Awareness Training Is a Team Effort

Don’t Let Organizational Politics Derail Security Initiatives

The CISO’s Guide to Minimizing Health Care Security Risks

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

The CISO’s Guide to Managing Insider Threats

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

Hire a Team of Hackers to Identify Vulnerabilities

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Succession Planning: The Importance of a Deputy CISO

Information Security in the Age of Disinformation

Is the CISO Job Market Overcrowded?

Building an Effective CISO-CIO Partnership

How The Next-Generation CISO Will Lead Security Strategy

CISO Complexity: A Role More Daunting Than Ever