top of page
Search
Security Leadership Master Class 3 : Building a security program
This is part 3 of a 7 part series grouping together sets of prior posts into a particular theme. Security Leadership Master Class 1 : Leveling up your leadership Security Leadership Master Class 2 : Dealing with the board and other executives Security Leadership Master Class 3 : Building a security program Security Leadership Master Class 4 : Enhancing or refreshing a security program Security Leadership Master Class 5 : Getting hired and doing hiring Security Leadership Mas
Nov 1, 20256 min read
Security Leadership Master Class 2 : Dealing with the board and other executives
This is part 2 of this 7 part series grouping together a set of prior posts into a particular theme. Security Leadership Master Class 1 : Leveling up your leadership Security Leadership Master Class 2 : Dealing with the board and other executives Security Leadership Master Class 3 : Building a security program Security Leadership Master Class 4 : Enhancing or refreshing a security program Security Leadership Master Class 5 : Getting hired and doing hiring Security Leadershi
Oct 18, 20254 min read
Security Leadership Master Class 1 : Leveling up your leadership
This is the first of a 7 part series where I’ll group together a set of prior posts into a particular theme that will make it all the...
Oct 4, 20254 min read
Good CISO / Bad CISO
In a first for this blog here is a post I worked on with Mike Aiello , a former colleague from Goldman Sachs and Google and someone, like...
Sep 20, 20255 min read
Metaphors Matter: Cyber War vs. Cyber Hygiene
Cybersecurity is a field built on metaphor. We wage "cyber wars," build "digital fortresses," and practice "cyber hygiene." These phrases...
Sep 6, 20254 min read
Everyone Has A Plan Until They Get Punched In The Face
Apparently what Mike Tyson actually said in a 1987 interview was, " Everybody has plans until they get hit for the first time". In any...
Aug 23, 20257 min read
Security and The 7 Deadly Sins
I re-stumbled across this well-worn meme of the 7 deadly sins and social media so, as many of you come back from Las Vegas I thought it...
Aug 9, 20253 min read
Decoding Cybercrime's True Scope: Beyond the Trillion-Dollar Hype
As security specialists, we regularly see claims about the escalating scale of cybercrime, often hearing staggering claims that it’s a...
Jul 26, 20255 min read
Career Longevity & The Don't Fire Me Chart
One of the more common patterns of security program success vs. failure is how much leadership is prepared to stick with the work over...
Jul 12, 20252 min read
Cyber Insights Needed & Delivered
I thought I’d try something different and share some thoughts on the Cyentia Institute’s latest report, the Information Risk Insights...
Jun 28, 20254 min read
Segmentation Technologies / Zero Trust
This is an update to a post from 2001 which I’m revisiting in part because some things have changed, but also because (surprisingly) much...
Jun 14, 20252 min read
CISO / Cybersecurity Leader Job Description
There is a plethora of sample job descriptions for security leaders that are often strictly correct but can also be uninspiring or too...
May 31, 20253 min read
bottom of page