top of page
Search
Compliance vs. Security
It is sad that many security discussions are so binary: that is, if you’re not wildly for something then you must be wildly against it....
Jul 25, 20204 min read
3,006 views
Threat Intelligence - Updated
This is an update from a thread that became a post last year. Threat intelligence seems, at least to me, to get maligned too much. For...
Jul 18, 20203 min read
1,339 views
A Security Professionals Guide to Dealing with Disagreement
Disagreement arises in many situations. It is an inevitable part of any work in any organization, or life in general. It is especially...
Jun 21, 20206 min read
3,142 views
Are Security Incidents Really Increasing?
I see regular waves of articles and commentary that assert : “We are spending more and more on security but security incidents / breaches...
Jun 7, 20204 min read
1,142 views
Resilience is about Capabilities not Plans
Resilience can be thought of as the ability to absorb shocks, adjust as needed and continue operation in the face of adversity. In other...
May 24, 20206 min read
2,104 views
Think Twice Before Switching Off Controls : Chesterton's Fence
Chesterton's Fence is a cautionary tale to make sure that before you change things you actually understand their purpose. This is...
May 9, 20202 min read
2,607 views
Cyber Risk Quantification
Risk quantification, in any field, is not an end in itself. It exists to compel some action. That action might be to drive decisions or...
May 3, 20205 min read
5,674 views
Are You Managing Your Risk Register Effectively?
Not all risks are possible to fully mitigate in every context, so you need to record and manage those residual risks. These are often put...
Apr 26, 20205 min read
3,925 views
Prioritizing Security Improvements - A Deceptively Simple Way
In most organizations you are constantly upgrading your security controls. This is for many reasons, including: New threats induce higher...
Apr 5, 20203 min read
2,463 views
Cybersecurity Macro Themes for the 2020's
In this coming decade there will be 5 major themes that differentiate great security programs, products, features and processes. These...
Mar 1, 20203 min read
2,074 views
Risk : Mega Trends
I've been thinking more about mega trends applied to risk, specifically operational risk (people, process, technology & external events)....
Feb 9, 20203 min read
1,272 views
The Leading Indicators of a Great Info/Cybersecurity Program
It can be hard to effectively assess, with a suitable degree of rigor, the security of your suppliers, counter-parties or companies you...
Jan 24, 20202 min read
1,948 views
Operational Resilience
The Bank of England has recently released a sequence of consultation papers, after an earlier discussion paper, laying out a framework...
Jan 19, 20204 min read
2,511 views
Predictions and Calls to Action
It’s that time of year for all the predictions of what to expect for the next year, and now - the next decade. I’m generally not a fan of...
Jan 1, 20203 min read
136 views
Non-Technical Books. Recommended List
For some reason, first at a TAG_Cyber event and then coincidentally at 2 other events, the question of what books security people should...
Dec 15, 20191 min read
557 views
Insider Threat Risk - Blast Radius Perspective
The management of insider threats is a complex and often under-thought process - people who work on it appreciate the subtlety and...
Dec 1, 20193 min read
315 views
Alternative Risk Management Strategies.
Much focus of risk mitigation is about implementing controls: preventative, detective and reactive. This is necessary in most cases, and...
Nov 24, 20192 min read
1,490 views
Shrines of Failure
I was at an event recently where one participant talked passionately about a disaster they had that they have since preserved artifacts...
Nov 10, 20191 min read
671 views
Career Longevity & "The Don't Fire Me Chart"
To fix anything sustainably requires long term action. This is especially true in technology risk and cybersecurity. The trouble is this...
Oct 26, 20191 min read
4,208 views
Risk Management is not only about Reducing Risk
It seems most risk and security programs, and instruction on how to run risk and security programs, focus exclusively on assessing risk,...
Oct 20, 20192 min read
633 views
bottom of page