top of page
Search
Human Error
Human error is not an explanation, rather it is something to be explained. In analyzing and learning from incidents, not just security...
Mar 12, 20229 min read
Â
Â
Controls - Updated
I wrote the first version of this post nearly 3 years ago. It is interesting that since then much of it remains true. Oddly, it also...
Feb 26, 20224 min read
Â
Â
Organizational Politics
At every stage in your career and in every part of your role you are going to have to deal with organizational politics. By this, I don’t...
Feb 12, 202218 min read
Â
Â
Secrets of Successful Security Programs - Part 2
As introduced in the last post, a successful security program is made up of two distinct elements: A series of episodic big bets that...
Jan 29, 202216 min read
Â
Â
Secrets of Successful Security Programs - Part 1
A successful security program (although I imagine this advice could apply to any discipline) is made up of two distinct elements: A...
Jan 15, 202211 min read
Â
Â
The Obvious CISO : Don’t Overlook the Simple
There is a great little book I read recently, “Obvious Adams - The Story of a Successful Businessman", it’s available on Amazon, but it’s...
Jan 1, 20227 min read
Â
Â
Risk Megatrends - Updated
Megatrends are long-term, large-scale forces that shape the world around us. They are the driving forces that have tactical consequences...
Dec 18, 20213 min read
Â
Â
How is the Security Profession Doing?
I spoke on a CIISEC panel a few months ago about the state of the information security profession. This post is based on remarks I made...
Dec 4, 20218 min read
Â
Â
Security Program Tactics - Updated
When starting or reinvigorating a security program, focus on a small number of meta-objectives that can have sustained outsize effects in...
Nov 20, 20214 min read
Â
Â
Slipstreaming : Business Tactics for Security & Control Implementation
One of the most frequent cybersecurity binary thinking curses is that just because senior leadership in organizations won’t do every...
Nov 6, 20216 min read
Â
Â
Conferences and the Wider Security Eco System Culture - Toxic or Not?
This could be part of another whole series on the curse of binary thinking so please read this in that tone. In other words, I’m trying...
Oct 22, 20214 min read
Â
Â
The Leading Indicators of a Great Info/Cybersecurity Program - Updated
As we see more incidents occurring, whether ransomware, data breaches or fraud, many thoughts turn to how to know whether those we do...
Oct 9, 20213 min read
Â
Â
bottom of page

