top of page
Search
Apr 19, 20204 min read
Intelligence Failures - “The Distortion of Retrospect”
The codebreaking and overall intelligence success of Bletchley Park in World War II is legendary. Ultra, along with broader Allied...
667
Apr 5, 20203 min read
Prioritizing Security Improvements - A Deceptively Simple Way
In most organizations you are constantly upgrading your security controls. This is for many reasons, including: New threats induce higher...
2,455
Mar 22, 20202 min read
Selling into a Crisis (Rights and Wrongs)
It can be irritating to receive e-mails from vendors during a time of crisis, like now, with the spin that their products can help. It is...
8,457
Mar 8, 202015 min read
Management 101 (+ remote working)
I have run organizations, large and small, local and remote, for many years. I have been the beneficiary (and victim) of many management...
3,794
Mar 1, 20203 min read
Cybersecurity Macro Themes for the 2020's
In this coming decade there will be 5 major themes that differentiate great security programs, products, features and processes. These...
2,073
Feb 9, 20203 min read
Risk : Mega Trends
I've been thinking more about mega trends applied to risk, specifically operational risk (people, process, technology & external events)....
1,268
Feb 2, 20205 min read
Dealing with the Deluge of Vendors
Everyone is deluged with approaches from product and service vendors, small and large. Even vendors struggle to keep track of who their...
1,554
Jan 24, 20202 min read
The Leading Indicators of a Great Info/Cybersecurity Program
It can be hard to effectively assess, with a suitable degree of rigor, the security of your suppliers, counter-parties or companies you...
1,946
Jan 19, 20204 min read
Operational Resilience
The Bank of England has recently released a sequence of consultation papers, after an earlier discussion paper, laying out a framework...
2,491
Jan 1, 20203 min read
Predictions and Calls to Action
It’s that time of year for all the predictions of what to expect for the next year, and now - the next decade. I’m generally not a fan of...
134
Dec 15, 20191 min read
Non-Technical Books. Recommended List
For some reason, first at a TAG_Cyber event and then coincidentally at 2 other events, the question of what books security people should...
552
Dec 7, 20193 min read
The Art of Influencing
A critical measure of success for most security roles is the ability to influence. I’ve often found people think influence skills are...
471
bottom of page