top of page
Search
Dealing with the Deluge of Vendors
Everyone is deluged with approaches from product and service vendors, small and large. Even vendors struggle to keep track of who their...
Feb 2, 20205 min read
Â
Â
The Leading Indicators of a Great Info/Cybersecurity Program
It can be hard to effectively assess, with a suitable degree of rigor, the security of your suppliers, counter-parties or companies you...
Jan 23, 20202 min read
Â
Â
Operational Resilience
The Bank of England has recently released a sequence of consultation papers, after an earlier discussion paper, laying out a framework...
Jan 19, 20204 min read
Â
Â
Predictions and Calls to Action
It’s that time of year for all the predictions of what to expect for the next year, and now - the next decade. I’m generally not a fan of...
Jan 1, 20203 min read
Â
Â
Non-Technical Books. Recommended List
For some reason, first at a TAG_Cyber event and then coincidentally at 2 other events, the question of what books security people should...
Dec 15, 20191 min read
Â
Â
The Art of Influencing
A critical measure of success for most security roles is the ability to influence. I’ve often found people think influence skills are...
Dec 7, 20193 min read
Â
Â
Insider Threat Risk - Blast Radius Perspective
The management of insider threats is a complex and often under-thought process - people who work on it appreciate the subtlety and...
Dec 1, 20193 min read
Â
Â
Alternative Risk Management Strategies.
Much focus of risk mitigation is about implementing controls: preventative, detective and reactive. This is necessary in most cases, and...
Nov 24, 20192 min read
Â
Â
Simple Rules of (InfoSec) Career Success
Over the years I made note of what behaviors I’ve seen from successful people. By success, I mean getting results, increase span of...
Nov 17, 20192 min read
Â
Â
Shrines of Failure
I was at an event recently where one participant talked passionately about a disaster they had that they have since preserved artifacts...
Nov 10, 20191 min read
Â
Â
Career Longevity & "The Don't Fire Me Chart"
To fix anything sustainably requires long term action. This is especially true in technology risk and cybersecurity. The trouble is this...
Oct 26, 20191 min read
Â
Â
Risk Management is not only about Reducing Risk
It seems most risk and security programs, and instruction on how to run risk and security programs, focus exclusively on assessing risk,...
Oct 20, 20192 min read
Â
Â
bottom of page

