Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor, contractor or supplier is just one connecte… Continue reading Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

Successful CISOs Use This Essential Tool Sparingly

If you think looking for a needle in a hay stack would be tough, imagine looking for a needle in a needle stack. Not just any needle, but a very specific needle that could stop a cyber attack or prevent a data breach. In the Information Age, every orga… Continue reading Successful CISOs Use This Essential Tool Sparingly

For CISOs, a Zero Trust Security Model Won’t Work Until You Do This First

When it comes to safeguarding organizations and the valuable digital assets they produce, hold, and share, a Zero Trust security model is considered par-excellence. But zero trust comes at a cost. If CISOs and their management teams strive for a genuin… Continue reading For CISOs, a Zero Trust Security Model Won’t Work Until You Do This First

CISOs: Focus On These Fundamentals For Long-Term Success

CISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or share sensitive information and … Continue reading CISOs: Focus On These Fundamentals For Long-Term Success

Think Your Data Is Hard to Protect? These Assets Are Even Harder.

In terms of sensitive information like PII, PHI, and IP, I’ve frequently said you can’t defend what you can’t see. It’s quite common for organizations to have customer data, financial information, and intellectual property store… Continue reading Think Your Data Is Hard to Protect? These Assets Are Even Harder.

If Good Help is So Hard to Find, CISOs Find This Next Part Even Harder

Cyber attacks, data breaches and compliance violations are just some of the challenges keeping CISOs up at night. While daunting, these threats are manageable, if you have the budget to address them. Cybersecurity budgets, however, are a precious commo… Continue reading If Good Help is So Hard to Find, CISOs Find This Next Part Even Harder

For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare

It’s human nature to model the behavior of those we admire. We dress like them, copy their mannerisms, and subscribe to their philosophies. After all, imitation is the sincerest form of flattery. But does buying the same basketball shoes as Steph… Continue reading For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare

The Secret to CISO Success? Do This One Thing Extremely Well

For CISOs who desire the proverbial seat at the table, they must do more than protect the business. They must intimately know the business; how it functions, what are its competitive advantages, and, of course, where are the inherent risks. As a CISO, … Continue reading The Secret to CISO Success? Do This One Thing Extremely Well

CISOs Add Value to the Business By Doing This

If cutting costs is a business imperative, it’s a mystery why CISOs get any budget at all. Yes, the CISO role has long been synonymous with cost. Some might even say CISOs and cybersecurity budgets are necessary evils. So, if an organization&#821… Continue reading CISOs Add Value to the Business By Doing This