Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor, contractor or supplier is just one connecte… Continue reading Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

CISOs: Focus On These Fundamentals For Long-Term Success

CISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or share sensitive information and … Continue reading CISOs: Focus On These Fundamentals For Long-Term Success

For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare

It’s human nature to model the behavior of those we admire. We dress like them, copy their mannerisms, and subscribe to their philosophies. After all, imitation is the sincerest form of flattery. But does buying the same basketball shoes as Steph… Continue reading For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare

Until Hackers Give Up, CISOs Must Always Do This

In the early 2000’s, UPS advertised that they moved “at the speed of business.” The implication was business moves quickly and UPS accommodated businesses by moving quickly too. Logistics experts however aren’t the only ones tha… Continue reading Until Hackers Give Up, CISOs Must Always Do This

Modern CISO’s Don’t Say This Word Anymore

When it’s your job to limit risk, it’s understandable to be wary of anything new. It’s much easier to stick to the formula because it’s safe and predictable. In a competitive business environment, however, the company that avoid… Continue reading Modern CISO’s Don’t Say This Word Anymore