top of page
Search
Security for More than Security’s Sake - The Need for Adjacent Benefits
Truly excellent security programs deliver more than security risk mitigation. I know it is kind of ridiculous to say that when doing the...
Oct 4, 20204 min read
The Most Important Mental Models for CISOs - Simple Steps for Outsize Effects
There are lots of problem solving techniques across many fields. These are often represented as mental models or behavioral short-cuts....
Sep 27, 20205 min read
The Rising Tide and the Case for Security Optimism
Continuing with the theme of raising the baseline by reducing the cost of control we can see the next logical progression is that the...
Sep 20, 20203 min read
Raise the Baseline by Reducing the Cost of Control
One of the most successful techniques for enterprise security in many organizations is to create a universal baseline of controls that...
Sep 13, 20204 min read
Taking Inventories to the Next Level - Reconciliation and Triangulation
We know it is important to have good inventories across all of the assets we care about in an enterprise. For security purposes this is,...
Sep 6, 20203 min read
Cybersecurity Workforce Development - Updated
It is still somewhat frustrating that most of the dialog about the skills shortage in cybersecurity focuses, perhaps inevitably, on the...
Aug 22, 20203 min read
Insider Threat - Blast Radius Perspective - Updated
Of the vast canon of insightful commentary that has come from Dan Geer over many years, one that especially stuck with me was his...
Aug 8, 20203 min read
Cybersecurity and the Board : A Fresh Perspective?
How to represent cybersecurity (or technology / information risks more generally) to the Board is an ongoing subject of discussion in...
Aug 1, 202010 min read
Compliance vs. Security
It is sad that many security discussions are so binary: that is, if you’re not wildly for something then you must be wildly against it....
Jul 25, 20204 min read
Threat Intelligence - Updated
This is an update from a thread that became a post last year. Threat intelligence seems, at least to me, to get maligned too much. For...
Jul 18, 20203 min read
Security Leadership: A-grades vs. Pass/Fail
The underlying secret of most great security leaders and teams is one thing: the ability to know what needs to be done really well vs....
Jul 12, 20203 min read
Are Security Incidents Really Increasing?
I see regular waves of articles and commentary that assert : “We are spending more and more on security but security incidents / breaches...
Jun 7, 20204 min read
Crypto isn’t the Only Cyber Issue in a Post Quantum World
Let’s assume general purpose quantum computers that can operate usefully at scale are coming. I think a reasonable timeframe is 15 years....
May 17, 20203 min read
Think Twice Before Switching Off Controls : Chesterton's Fence
Chesterton's Fence is a cautionary tale to make sure that before you change things you actually understand their purpose. This is...
May 9, 20202 min read
Cyber Risk Quantification
Risk quantification, in any field, is not an end in itself. It exists to compel some action. That action might be to drive decisions or...
May 3, 20205 min read
Are You Managing Your Risk Register Effectively?
Not all risks are possible to fully mitigate in every context, so you need to record and manage those residual risks. These are often put...
Apr 26, 20205 min read
Intelligence Failures - “The Distortion of Retrospect”
The codebreaking and overall intelligence success of Bletchley Park in World War II is legendary. Ultra, along with broader Allied...
Apr 19, 20204 min read
Prioritizing Security Improvements - A Deceptively Simple Way
In most organizations you are constantly upgrading your security controls. This is for many reasons, including: New threats induce higher...
Apr 5, 20203 min read
Selling into a Crisis (Rights and Wrongs)
It can be irritating to receive e-mails from vendors during a time of crisis, like now, with the spin that their products can help. It is...
Mar 22, 20202 min read
Cybersecurity Macro Themes for the 2020's
In this coming decade there will be 5 major themes that differentiate great security programs, products, features and processes. These...
Mar 1, 20203 min read
bottom of page