top of page
Search
Aug 1, 202010 min read
Cybersecurity and the Board : A Fresh Perspective?
How to represent cybersecurity (or technology / information risks more generally) to the Board is an ongoing subject of discussion in...
6,022
Jul 25, 20204 min read
Compliance vs. Security
It is sad that many security discussions are so binary: that is, if you’re not wildly for something then you must be wildly against it....
2,955
Jul 18, 20203 min read
Threat Intelligence - Updated
This is an update from a thread that became a post last year. Threat intelligence seems, at least to me, to get maligned too much. For...
1,337
Jul 12, 20203 min read
Security Leadership: A-grades vs. Pass/Fail
The underlying secret of most great security leaders and teams is one thing: the ability to know what needs to be done really well vs....
1,988
Jun 28, 20202 min read
A Simple Manifesto for Leading Security and Risk Teams
I’ve been using variants of these principles for many years in many contexts, both for security and broader risk management teams. I have...
2,206
Jun 21, 20206 min read
A Security Professionals Guide to Dealing with Disagreement
Disagreement arises in many situations. It is an inevitable part of any work in any organization, or life in general. It is especially...
3,136
Jun 7, 20204 min read
Are Security Incidents Really Increasing?
I see regular waves of articles and commentary that assert : “We are spending more and more on security but security incidents / breaches...
1,138
May 24, 20206 min read
Resilience is about Capabilities not Plans
Resilience can be thought of as the ability to absorb shocks, adjust as needed and continue operation in the face of adversity. In other...
2,088
May 17, 20203 min read
Crypto isn’t the Only Cyber Issue in a Post Quantum World
Let’s assume general purpose quantum computers that can operate usefully at scale are coming. I think a reasonable timeframe is 15 years....
695
May 9, 20202 min read
Think Twice Before Switching Off Controls : Chesterton's Fence
Chesterton's Fence is a cautionary tale to make sure that before you change things you actually understand their purpose. This is...
2,599
May 3, 20205 min read
Cyber Risk Quantification
Risk quantification, in any field, is not an end in itself. It exists to compel some action. That action might be to drive decisions or...
5,630
Apr 26, 20205 min read
Are You Managing Your Risk Register Effectively?
Not all risks are possible to fully mitigate in every context, so you need to record and manage those residual risks. These are often put...
3,784
bottom of page