top of page
Search
Jan 2, 20211 min read
2020 Short Review
At the risk of being too understated, 2020 was an interesting year. In this blog I’ve covered many topics across the range of strategy...
925
Dec 19, 20205 min read
Privilege Management Program - Governance
I can’t recall having seen an overview of a systematized privilege management program. There are lots of great articles on specific...
2,340
Dec 13, 20208 min read
Security Ratings: Love, Loathe or Live With Them?
Security ratings services tend to be loved or loathed. Loved if you consume them and it makes your job easier, especially if you have no...
4,158
Dec 6, 20206 min read
The Seat at the Table: Integrating Security into your Business
The success of a security program is largely determined by how well it is integrated into the fabric of the organization, in terms of...
2,051
Nov 29, 20203 min read
Simple Rules of (InfoSec) Career Success - Updated
Over the years I've noted the behaviors I’ve seen from consistently successful people. In this context I define success as a balance of...
1,644
Nov 22, 20205 min read
Scenario Planning - The Best Technique You Might Not Be Using
Scenario planning is one of the most underutilized techniques in security. Which is surprising given how effective it is in [good]...
2,625
Nov 15, 20206 min read
12 Step Guide on Escalating Risk and Security Issues
Escalating issues is part of the foundation of any good risk and security program. Unfortunately, human nature is such that most people...
4,156
Nov 8, 20204 min read
Principles for Cybersecurity Metrics
“For every metric, there should be another ‘paired’ metric that addresses adverse consequences of the first metric.” - Andy Grove We talk...
3,891
Nov 1, 20207 min read
The Uncanny Valley of Security (or Why We Might Never Finish Anything)
The uncanny value is a famous term in robotics. It is used to describe how we accept robots that don’t attempt to look too human, but,...
3,062
Oct 25, 20204 min read
Cybersecurity Macro Themes for the 2020’s - Updated
There will be 6 major themes that differentiate great security programs, products, features and processes. These are different from...
1,793
Oct 18, 20203 min read
Why Cybersecurity Budget Benchmarks are a Waste of Time
I have built up a disdain for cybersecurity budgeting benchmarks. To be fair, there are some good attempts amid a sea of haphazard...
2,696
Oct 13, 20202 min read
Vulnerability Management - Updated
It still surprises me that much of the tone of vulnerability management is about patch/bug fix vs. detecting broader configuration and...
2,242
bottom of page