top of page
Search
Mar 13, 20214 min read
Return on Investment for Security
The concept of return on investment (ROI) for security has bugged me for a long time. Not because it isn’t a laudable goal. Of course,...
5,537 views
Feb 13, 20214 min read
Research Challenges in Info/Cybersecurity - Part 2: “Carbon”
This is the second part of the post from 2 weeks ago, which explored research challenges in Info/Cybersecurity related to systems:...
837 views
Jan 17, 20213 min read
Situational Drivers of Cyber-Risk
Many years ago I wrote down a list of the drivers that create information / cyber-risk or that otherwise compel the need to mitigate this...
2,083 views
Jan 2, 20211 min read
2020 Short Review
At the risk of being too understated, 2020 was an interesting year. In this blog I’ve covered many topics across the range of strategy...
925 views
Dec 13, 20208 min read
Security Ratings: Love, Loathe or Live With Them?
Security ratings services tend to be loved or loathed. Loved if you consume them and it makes your job easier, especially if you have no...
4,158 views
Dec 6, 20206 min read
The Seat at the Table: Integrating Security into your Business
The success of a security program is largely determined by how well it is integrated into the fabric of the organization, in terms of...
2,053 views
Nov 22, 20205 min read
Scenario Planning - The Best Technique You Might Not Be Using
Scenario planning is one of the most underutilized techniques in security. Which is surprising given how effective it is in [good]...
2,631 views
Nov 15, 20206 min read
12 Step Guide on Escalating Risk and Security Issues
Escalating issues is part of the foundation of any good risk and security program. Unfortunately, human nature is such that most people...
4,163 views
Nov 8, 20204 min read
Principles for Cybersecurity Metrics
“For every metric, there should be another ‘paired’ metric that addresses adverse consequences of the first metric.” - Andy Grove We talk...
3,892 views
Nov 1, 20207 min read
The Uncanny Valley of Security (or Why We Might Never Finish Anything)
The uncanny value is a famous term in robotics. It is used to describe how we accept robots that don’t attempt to look too human, but,...
3,062 views
Oct 18, 20203 min read
Why Cybersecurity Budget Benchmarks are a Waste of Time
I have built up a disdain for cybersecurity budgeting benchmarks. To be fair, there are some good attempts amid a sea of haphazard...
2,698 views
Oct 10, 20204 min read
Building Balanced Security Teams: The Rule of Thirds
As an industry we spend a lot of time talking about workforce development and skills shortages. We tend not to talk about how to organize...
3,063 views
Oct 4, 20204 min read
Security for More than Security’s Sake - The Need for Adjacent Benefits
Truly excellent security programs deliver more than security risk mitigation. I know it is kind of ridiculous to say that when doing the...
1,249 views
Sep 27, 20205 min read
The Most Important Mental Models for CISOs - Simple Steps for Outsize Effects
There are lots of problem solving techniques across many fields. These are often represented as mental models or behavioral short-cuts....
2,268 views
Sep 13, 20204 min read
Raise the Baseline by Reducing the Cost of Control
One of the most successful techniques for enterprise security in many organizations is to create a universal baseline of controls that...
1,649 views
Sep 6, 20203 min read
Taking Inventories to the Next Level - Reconciliation and Triangulation
We know it is important to have good inventories across all of the assets we care about in an enterprise. For security purposes this is,...
1,256 views
Aug 29, 20205 min read
Security Budgets - Supply and Demand Thinking
How you obtain and manage a budget to drive an adequate level of security is immensely important. Yet, it is one of the least discussed...
2,115 views
Aug 16, 20206 min read
Tips for Running a Risk Committee
In any sizable organization it is important to have some form of management steering group or committee to oversee your risk program. The...
2,681 views
Jul 25, 20204 min read
Compliance vs. Security
It is sad that many security discussions are so binary: that is, if you’re not wildly for something then you must be wildly against it....
2,939 views
Jul 18, 20203 min read
Threat Intelligence - Updated
This is an update from a thread that became a post last year. Threat intelligence seems, at least to me, to get maligned too much. For...
1,336 views
bottom of page