RISK & CYBERSECURITY

Thoughts from the Field
  • HOME

  • ABOUT

  • RECENT EVENTS & PUBLICATIONS

  • More

    Use tab to navigate through the menu items.
    • Instagram - White Circle
    • All Posts
    • Leadership
    • Risk
    • Cybersecurity
    • Technology
    Search
    • Jan 17, 2021
    • 3 min

    Situational Drivers of Cyber-Risk

    Many years ago I wrote down a list of the drivers that create information / cyber-risk or that otherwise compel the need to mitigate this...
    1,874
    • Jan 2, 2021
    • 1 min

    2020 Short Review

    At the risk of being too understated, 2020 was an interesting year. In this blog I’ve covered many topics across the range of strategy...
    914
    • Dec 19, 2020
    • 5 min

    Privilege Management Program - Governance

    I can’t recall having seen an overview of a systematized privilege management program. There are lots of great articles on specific...
    1,656
    • Dec 13, 2020
    • 8 min

    Security Ratings: Love, Loathe or Live With Them?

    Security ratings services tend to be loved or loathed. Loved if you consume them and it makes your job easier, especially if you have no...
    3,794
    • Dec 6, 2020
    • 6 min

    The Seat at the Table: Integrating Security into your Business

    The success of a security program is largely determined by how well it is integrated into the fabric of the organization, in terms of...
    1,853
    • Nov 29, 2020
    • 3 min

    Simple Rules of (InfoSec) Career Success - Updated

    Over the years I've noted the behaviors I’ve seen from consistently successful people. In this context I define success as a balance of...
    1,424
    • Nov 22, 2020
    • 5 min

    Scenario Planning - The Best Technique You Might Not Be Using

    Scenario planning is one of the most underutilized techniques in security. Which is surprising given how effective it is in [good]...
    1,838
    • Nov 15, 2020
    • 6 min

    12 Step Guide on Escalating Risk and Security Issues 

    Escalating issues is part of the foundation of any good risk and security program. Unfortunately, human nature is such that most people...
    2,098
    • Nov 8, 2020
    • 4 min

    Principles for Cybersecurity Metrics

    “For every metric, there should be another ‘paired’ metric that addresses adverse consequences of the first metric.” - Andy Grove We talk...
    2,584
    • Nov 1, 2020
    • 7 min

    The Uncanny Valley of Security (or Why We Might Never Finish Anything)

    The uncanny value is a famous term in robotics.  It is used to describe how we accept robots that don’t attempt to look too human, but,...
    2,452
    • Oct 25, 2020
    • 4 min

    Cybersecurity Macro Themes for the 2020’s - Updated

    There will be 6 major themes that differentiate great security programs, products, features and processes. These are different from...
    1,710
    • Oct 18, 2020
    • 3 min

    Why Cybersecurity Budget Benchmarks are a Waste of Time

    I have built up a disdain for cybersecurity budgeting benchmarks. To be fair, there are some good attempts amid a sea of haphazard...
    2,092
    23
    4
    56
    Subscribe for updates.

    Thanks for submitting!

    © 2020 Philip Venables.