top of page
Search
Feb 13, 20214 min read
Research Challenges in Info/Cybersecurity - Part 2: “Carbon”
This is the second part of the post from 2 weeks ago, which explored research challenges in Info/Cybersecurity related to systems:...
837 views
Jan 17, 20213 min read
Situational Drivers of Cyber-Risk
Many years ago I wrote down a list of the drivers that create information / cyber-risk or that otherwise compel the need to mitigate this...
2,080 views
Jan 2, 20211 min read
2020 Short Review
At the risk of being too understated, 2020 was an interesting year. In this blog I’ve covered many topics across the range of strategy...
925 views
Dec 13, 20208 min read
Security Ratings: Love, Loathe or Live With Them?
Security ratings services tend to be loved or loathed. Loved if you consume them and it makes your job easier, especially if you have no...
4,158 views
Dec 6, 20206 min read
The Seat at the Table: Integrating Security into your Business
The success of a security program is largely determined by how well it is integrated into the fabric of the organization, in terms of...
2,044 views
Nov 22, 20205 min read
Scenario Planning - The Best Technique You Might Not Be Using
Scenario planning is one of the most underutilized techniques in security. Which is surprising given how effective it is in [good]...
2,609 views
Nov 15, 20206 min read
12 Step Guide on Escalating Risk and Security Issues
Escalating issues is part of the foundation of any good risk and security program. Unfortunately, human nature is such that most people...
4,147 views
Nov 8, 20204 min read
Principles for Cybersecurity Metrics
“For every metric, there should be another ‘paired’ metric that addresses adverse consequences of the first metric.” - Andy Grove We talk...
3,877 views
Nov 1, 20207 min read
The Uncanny Valley of Security (or Why We Might Never Finish Anything)
The uncanny value is a famous term in robotics. It is used to describe how we accept robots that don’t attempt to look too human, but,...
3,057 views
Oct 18, 20203 min read
Why Cybersecurity Budget Benchmarks are a Waste of Time
I have built up a disdain for cybersecurity budgeting benchmarks. To be fair, there are some good attempts amid a sea of haphazard...
2,686 views
Oct 10, 20204 min read
Building Balanced Security Teams: The Rule of Thirds
As an industry we spend a lot of time talking about workforce development and skills shortages. We tend not to talk about how to organize...
3,046 views
Oct 4, 20204 min read
Security for More than Security’s Sake - The Need for Adjacent Benefits
Truly excellent security programs deliver more than security risk mitigation. I know it is kind of ridiculous to say that when doing the...
1,229 views
Sep 27, 20205 min read
The Most Important Mental Models for CISOs - Simple Steps for Outsize Effects
There are lots of problem solving techniques across many fields. These are often represented as mental models or behavioral short-cuts....
2,247 views
Sep 13, 20204 min read
Raise the Baseline by Reducing the Cost of Control
One of the most successful techniques for enterprise security in many organizations is to create a universal baseline of controls that...
1,626 views
Sep 6, 20203 min read
Taking Inventories to the Next Level - Reconciliation and Triangulation
We know it is important to have good inventories across all of the assets we care about in an enterprise. For security purposes this is,...
1,253 views
Aug 29, 20205 min read
Security Budgets - Supply and Demand Thinking
How you obtain and manage a budget to drive an adequate level of security is immensely important. Yet, it is one of the least discussed...
2,108 views
Aug 16, 20206 min read
Tips for Running a Risk Committee
In any sizable organization it is important to have some form of management steering group or committee to oversee your risk program. The...
2,675 views
Jul 25, 20204 min read
Compliance vs. Security
It is sad that many security discussions are so binary: that is, if you’re not wildly for something then you must be wildly against it....
2,902 views
Jul 18, 20203 min read
Threat Intelligence - Updated
This is an update from a thread that became a post last year. Threat intelligence seems, at least to me, to get maligned too much. For...
1,334 views
Jun 21, 20206 min read
A Security Professionals Guide to Dealing with Disagreement
Disagreement arises in many situations. It is an inevitable part of any work in any organization, or life in general. It is especially...
3,119 views
bottom of page