top of page
Search
2025 Year in Review - Top 10
The most read posts in 2025 coalesced around the concept that successful cybersecurity is fundamentally a function of business leadership, strategic design, and sustainable execution . The unifying themes across the top posts emphasize shifting security from an artisanal, reactive craft to an industrial-scale, proactive capability focused on building scalable, self-reinforcing systems (flywheels). Transformation requires leaders to manage stakeholder expectations carefully, p
Jan 104 min read
Security Leadership Master Class 7 : Contrarian takes
This is the final of the series grouping together sets of prior posts into a particular theme. Security Leadership Master Class 1 : Leveling up your leadership Security Leadership Master Class 2 : Dealing with the board and other executives Security Leadership Master Class 3 : Building a security program Security Leadership Master Class 4 : Enhancing/refreshing a security program Security Leadership Master Class 5 : Getting hired and doing hiring Security Leadership Master C
Dec 27, 20254 min read
Security Leadership Master Class 6 : When disaster strikes
This is part 6 of a 7 part series grouping together sets of prior posts into a particular theme. Security Leadership Master Class 1 : Leveling up your leadership Security Leadership Master Class 2 : Dealing with the board and other executives Security Leadership Master Class 3 : Building a security program Security Leadership Master Class 4 : Enhancing/refreshing a security program Security Leadership Master Class 5 : Getting hired and doing hiring Security Leadership Master
Dec 13, 20255 min read
Security Leadership Master Class 5 : Getting hired and doing hiring
This is part 5 of a 7 part series grouping together sets of prior posts into a particular theme. Security Leadership Master Class 1 : Leveling up your leadership Security Leadership Master Class 2 : Dealing with the board and other executives Security Leadership Master Class 3 : Building a security program Security Leadership Master Class 4 : Enhancing/refreshing a security program Security Leadership Master Class 5 : Getting hired and doing hiring Security Leadership Master
Nov 29, 20255 min read
Security Leadership Master Class 4 : Enhancing a Security Program
This is part 4 of a 7 part series grouping together sets of prior posts into a particular theme. Security Leadership Master Class 1 : Leveling up your leadership Security Leadership Master Class 2 : Dealing with the board and other executives Security Leadership Master Class 3 : Building a security program Security Leadership Master Class 4 : Enhancing/refreshing a security program Security Leadership Master Class 5 : Getting hired and doing hiring Security Leadership Master
Nov 15, 20256 min read
Security Leadership Master Class 3 : Building a security program
This is part 3 of a 7 part series grouping together sets of prior posts into a particular theme. Security Leadership Master Class 1 : Leveling up your leadership Security Leadership Master Class 2 : Dealing with the board and other executives Security Leadership Master Class 3 : Building a security program Security Leadership Master Class 4 : Enhancing or refreshing a security program Security Leadership Master Class 5 : Getting hired and doing hiring Security Leadership Mas
Nov 1, 20256 min read
Security Leadership Master Class 2 : Dealing with the board and other executives
This is part 2 of this 7 part series grouping together a set of prior posts into a particular theme. Security Leadership Master Class 1 : Leveling up your leadership Security Leadership Master Class 2 : Dealing with the board and other executives Security Leadership Master Class 3 : Building a security program Security Leadership Master Class 4 : Enhancing or refreshing a security program Security Leadership Master Class 5 : Getting hired and doing hiring Security Leadershi
Oct 18, 20254 min read
Security Leadership Master Class 1 : Leveling up your leadership
This is the first of a 7 part series where I’ll group together a set of prior posts into a particular theme that will make it all the...
Oct 4, 20254 min read
Good CISO / Bad CISO
In a first for this blog here is a post I worked on with Mike Aiello , a former colleague from Goldman Sachs and Google and someone, like...
Sep 20, 20255 min read
Metaphors Matter: Cyber War vs. Cyber Hygiene
Cybersecurity is a field built on metaphor. We wage "cyber wars," build "digital fortresses," and practice "cyber hygiene." These phrases...
Sep 6, 20254 min read
Everyone Has A Plan Until They Get Punched In The Face
Apparently what Mike Tyson actually said in a 1987 interview was, " Everybody has plans until they get hit for the first time". In any...
Aug 23, 20257 min read
Security and The 7 Deadly Sins
I re-stumbled across this well-worn meme of the 7 deadly sins and social media so, as many of you come back from Las Vegas I thought it...
Aug 9, 20253 min read
Decoding Cybercrime's True Scope: Beyond the Trillion-Dollar Hype
As security specialists, we regularly see claims about the escalating scale of cybercrime, often hearing staggering claims that it’s a...
Jul 26, 20255 min read
Career Longevity & The Don't Fire Me Chart
One of the more common patterns of security program success vs. failure is how much leadership is prepared to stick with the work over...
Jul 12, 20252 min read
Cyber Insights Needed & Delivered
I thought I’d try something different and share some thoughts on the Cyentia Institute’s latest report, the Information Risk Insights...
Jun 28, 20254 min read
Segmentation Technologies / Zero Trust
This is an update to a post from 2001 which I’m revisiting in part because some things have changed, but also because (surprisingly) much...
Jun 14, 20252 min read
CISO / Cybersecurity Leader Job Description
There is a plethora of sample job descriptions for security leaders that are often strictly correct but can also be uninspiring or too...
May 31, 20253 min read
Scaling Security, AI and More....
I recently joined Clint Gibler (tl;dr sec) at RSA for a great discussion. In it we cover a wide array of topics from the challenge of...
May 20, 20251 min read
Starting a Security Program from Scratch (or re-starting)
I’ve had a number of requests to write a post about how to start and grow a new security program - or a substantial reassessment and...
May 17, 202512 min read
CISO: Librarian, Archeologist or Explorer?
I first wrote this post back in 2021 so I thought it’s time for a revisit with an addition of a few more roles. We talk about attackers...
May 3, 20256 min read
bottom of page

