top of page
Search
Aug 1, 202010 min read
Cybersecurity and the Board : A Fresh Perspective?
How to represent cybersecurity (or technology / information risks more generally) to the Board is an ongoing subject of discussion in...
6,022 views
Jul 25, 20204 min read
Compliance vs. Security
It is sad that many security discussions are so binary: that is, if you’re not wildly for something then you must be wildly against it....
2,955 views
Jul 18, 20203 min read
Threat Intelligence - Updated
This is an update from a thread that became a post last year. Threat intelligence seems, at least to me, to get maligned too much. For...
1,337 views
Jul 12, 20203 min read
Security Leadership: A-grades vs. Pass/Fail
The underlying secret of most great security leaders and teams is one thing: the ability to know what needs to be done really well vs....
1,988 views
Jun 7, 20204 min read
Are Security Incidents Really Increasing?
I see regular waves of articles and commentary that assert : “We are spending more and more on security but security incidents / breaches...
1,139 views
May 17, 20203 min read
Crypto isn’t the Only Cyber Issue in a Post Quantum World
Let’s assume general purpose quantum computers that can operate usefully at scale are coming. I think a reasonable timeframe is 15 years....
695 views
May 9, 20202 min read
Think Twice Before Switching Off Controls : Chesterton's Fence
Chesterton's Fence is a cautionary tale to make sure that before you change things you actually understand their purpose. This is...
2,599 views
May 3, 20205 min read
Cyber Risk Quantification
Risk quantification, in any field, is not an end in itself. It exists to compel some action. That action might be to drive decisions or...
5,630 views
Apr 26, 20205 min read
Are You Managing Your Risk Register Effectively?
Not all risks are possible to fully mitigate in every context, so you need to record and manage those residual risks. These are often put...
3,784 views
Apr 19, 20204 min read
Intelligence Failures - “The Distortion of Retrospect”
The codebreaking and overall intelligence success of Bletchley Park in World War II is legendary. Ultra, along with broader Allied...
667 views
Apr 5, 20203 min read
Prioritizing Security Improvements - A Deceptively Simple Way
In most organizations you are constantly upgrading your security controls. This is for many reasons, including: New threats induce higher...
2,453 views
Mar 22, 20202 min read
Selling into a Crisis (Rights and Wrongs)
It can be irritating to receive e-mails from vendors during a time of crisis, like now, with the spin that their products can help. It is...
8,457 views
Mar 1, 20203 min read
Cybersecurity Macro Themes for the 2020's
In this coming decade there will be 5 major themes that differentiate great security programs, products, features and processes. These...
2,073 views
Feb 2, 20205 min read
Dealing with the Deluge of Vendors
Everyone is deluged with approaches from product and service vendors, small and large. Even vendors struggle to keep track of who their...
1,553 views
Jan 24, 20202 min read
The Leading Indicators of a Great Info/Cybersecurity Program
It can be hard to effectively assess, with a suitable degree of rigor, the security of your suppliers, counter-parties or companies you...
1,945 views
Jan 1, 20203 min read
Predictions and Calls to Action
It’s that time of year for all the predictions of what to expect for the next year, and now - the next decade. I’m generally not a fan of...
134 views
Dec 1, 20193 min read
Insider Threat Risk - Blast Radius Perspective
The management of insider threats is a complex and often under-thought process - people who work on it appreciate the subtlety and...
309 views
Nov 24, 20192 min read
Alternative Risk Management Strategies.
Much focus of risk mitigation is about implementing controls: preventative, detective and reactive. This is necessary in most cases, and...
1,454 views
Nov 10, 20191 min read
Shrines of Failure
I was at an event recently where one participant talked passionately about a disaster they had that they have since preserved artifacts...
669 views
Oct 26, 20191 min read
Career Longevity & "The Don't Fire Me Chart"
To fix anything sustainably requires long term action. This is especially true in technology risk and cybersecurity. The trouble is this...
4,182 views
bottom of page