RISK & CYBERSECURITY

Thoughts from the Field
  • HOME

  • ABOUT

  • RECENT EVENTS & PUBLICATIONS

  • More

    Use tab to navigate through the menu items.
    • Instagram - White Circle
    • All Posts
    • Leadership
    • Risk
    • Cybersecurity
    • Technology
    Search
    • May 21
    • 7 min

    Defense in Depth

    Defense in depth is a well accepted security principle. Intuitively, it stipulates there should be multiple lines of controls so as to...
    2,326 views
    • May 8
    • 9 min

    Regulatory Relationships

    For some reason there have been a few people already in or moving into highly regulated industries, like finance or healthcare, that have...
    1,115 views
    • Apr 9
    • 9 min

    10 Fundamental (but really hard) Security Metrics

    As an industry we have been trying to deal with the issue of security metrics for a long time. I’ve written about this here, and in the...
    9,512 views
    • Mar 26
    • 7 min

    Resilience is about Capabilities not Plans - Updated

    Over the past 2 years, since I wrote the first version of this post, we’ve had a lot of opportunity to test our collective resilience....
    2,987 views
    • Mar 12
    • 9 min

    Human Error

    Human error is not an explanation, rather it is something to be explained. In analyzing and learning from incidents, not just security...
    2,246 views
    • Feb 26
    • 4 min

    Controls - Updated

    I wrote the first version of this post nearly 3 years ago. It is interesting that since then much of it remains true. Oddly, it also...
    3,177 views
    • Jan 1
    • 7 min

    The Obvious CISO : Don’t Overlook the Simple

    There is a great little book I read recently, “Obvious Adams - The Story of a Successful Businessman", it’s available on Amazon, but it’s...
    1,458 views
    • Dec 18, 2021
    • 3 min

    Risk Megatrends - Updated

    Megatrends are long-term, large-scale forces that shape the world around us. They are the driving forces that have tactical consequences...
    2,342 views
    • Dec 4, 2021
    • 8 min

    How is the Security Profession Doing?

    I spoke on a CIISEC panel a few months ago about the state of the information security profession. This post is based on remarks I made...
    2,217 views
    • Nov 20, 2021
    • 4 min

    Security Program Tactics - Updated

    When starting or reinvigorating a security program, focus on a small number of meta-objectives that can have sustained outsize effects in...
    2,095 views
    • Nov 6, 2021
    • 6 min

    Slipstreaming : Business Tactics for Security & Control Implementation

    One of the most frequent cybersecurity binary thinking curses is that just because senior leadership in organizations won’t do every...
    1,299 views
    • Oct 9, 2021
    • 3 min

    The Leading Indicators of a Great Info/Cybersecurity Program - Updated

    As we see more incidents occurring, whether ransomware, data breaches or fraud, many thoughts turn to how to know whether those we do...
    3,770 views
    • Sep 12, 2021
    • 8 min

    If Accounting were like Cybersecurity

    It has always struck me how well the field of finance and more specifically accounting has done to standardize on its terms. This...
    2,298 views
    • Aug 27, 2021
    • 3 min

    Risk Management is not only about Reducing Risk - Updated

    This is an update from a post of a couple of years ago prompted by some recent observations from a few different organizations. It seems...
    2,488 views
    • Aug 14, 2021
    • 9 min

    Risk = Hazard + Outrage

    There are four major insights that, above all others, have influenced my approach to security and risk management over the past decades....
    3,386 views
    • Jul 30, 2021
    • 7 min

    CISO: Archeologist, Historian or Explorer?

    We talk about attackers being the enemy. Sometimes we talk about insider threats. But one of our biggest enemies is pernicious...
    1,952 views
    • Jul 16, 2021
    • 8 min

    Cybersecurity - The Board's Perspective

    How Boards, especially public company Boards, oversee cybersecurity is a crucial but difficult topic. This previous post discussed how...
    6,766 views
    • Jun 5, 2021
    • 6 min

    Relationship Management for the InfoSec Program

    A key part of any security leader's role is relationship management. In my experience this is another one of those leadership skills that...
    1,981 views
    • May 8, 2021
    • 7 min

    Is Complexity the Enemy of Security?

    One of the many pieces of accepted wisdom in information/cybersecurity is that complexity is the enemy of security. But is it? You...
    3,188 views
    • Apr 24, 2021
    • 1 min

    Leadership, Business, Security and Risk Reading List

    This is my list of favorite books across the various professional disciplines I’m interested in. I have a set of favorite books that are...
    2,368 views
    1
    234
    Subscribe for updates.

    Thanks for submitting!

    © 2020 Philip Venables.