Identify the “who” in risk mitigation

Identify the “who” in risk mitigation

Risk management strategies are designed for organizations seeking to improve their resilience in the face of a dynamic and ever-changing threat landscape. Knowing the “whos” will greatly assist organizations in developing unique...

06/29/16

Cyber threats and pharmaceuticals

Cyber threats and pharmaceuticals

We must evolve our security strategies with the threat environment and adapt to the dynamic nature of the threat actors themselves, how they operate, and devise our strategies accordingly.

06/17/16

Insider threat mitigation techniques worth considering

Insider threat mitigation techniques worth considering

In today’s data rich threat landscape, it is no longer enough to just be able to detect anomalous behavior. It is, however, important to be able to detect those meaningful anomalies. Establishing an insider threat detection that...

06/02/16

Ransomware attacks force hospitals to stitch up networks

Ransomware attacks force hospitals to stitch up networks

The lessons to be drawn from recent incidents is the need for hospitals to develop and implement a strong cyber resiliency plan that incorporates incident response as well recovery operations from such attacks. The threat of...

05/19/16

Mitigating insider threats from a people perspective

Mitigating insider threats from a people perspective

Mitigating insider threats is an ongoing effort that requires a holistic approach that encompasses technological as well as human solutions. Additionally, organizational and situational factors can help mitigate the threat posed by...

05/05/16

Cyber threats come from all angles at the financial services industry

Cyber threats come from all angles at the financial services industry

Reputational loss and reduction in customer confidence can severely impact the long-term well-being of a financial institution ill prepared for the threats that they face. Each organization must develop a strategy that finds the right...

04/18/16

Security can be a competitive differentiator

Security can be a competitive differentiator

Organizations that are able to demonstrate that they have cyber security strategies in place to include incident and contingency planning position themselves ahead of competitors that are in the process of developing them or have yet...

04/01/16

How to keep your highly skilled and paid security team happy and engaged

How to keep your highly skilled and paid security team happy and engaged

Employees contribute significantly to an organization’s achievements and a cyber security team is no different. Its value can be measured by the reduced number of security incidents and the speed and efficiency with which those...

03/21/16

CISOs must quickly adapt to any situation

CISOs must quickly adapt to any situation

Today’s CISO is in the unique position of becoming an important conduit between the C-Suite and the operators that keep an organization running. The position is a pivotal spoke in a large wheel having visibility and influence in...

03/08/16

Retaining security talent by embracing distributed team management

Retaining security talent by embracing distributed team management

Ask anyone in a security leadership role about their team and you’ll likely find that the great majority are struggling. They are struggling because finding security talent is increasingly hard and keeping that talent is even harder....

02/22/16

How to convince the CFO of the budgetary security need

How to convince the CFO of the budgetary security need

It had been custom for organizations to think of cyber security in terms of an information technology (IT) problem best left to IT people to address and fix. However, as more prolific breaches were publicized exposing a variety of...

02/09/16

5 sins cybersecurity executives should avoid

5 sins cybersecurity executives should avoid

With the advent of 2016, I was tempted to touch upon my thoughts on what the future of the cyber landscape will hold, prognosticating trends and shifts and what the next big threat would be. However, upon deeper reflection and...

01/04/16

Thinking outside the product box

Thinking outside the product box

The dynamic nature of the cyber threat landscape guarantees that the threats and the actors behind them are always evolving, increasing in sophistication in order to circumvent the most robust security devices. As such, our cyber...

12/09/15

The technocracy is over – innovation is here, plan your security accordingly

The technocracy is over – innovation is here, plan your security accordingly

Information technology (IT) is going through an age of “technocracy” decline. Innovations in the IT sector have made way for various platforms that can be leveraged to support employees’ workflows and processes. As a result,...

10/13/15

Tighten up your cyber security strategies now

Tighten up your cyber security strategies now

While there are many security offerings to help an organization better protect itself from the onslaught of cyber threats knocking on its perimeter, no one solution is enough to reduce risk in this dynamic landscape. Each individual...

09/18/15

Cyber security culture is a collective effort

Cyber security culture is a collective effort

Many believe that cyber security culture starts from the top and works its way down. While there is merit to this statement, I would argue that all stakeholders in the ecosystem create cultures collectively.

08/27/15

Social media can quickly take down your business if not monitored

Social media can quickly take down your business if not monitored

Not having a plan in place to protect your brand risks losing public trust and confidence that build long lasting relationships. Trying to restore them can be an arduous undertaking. And a costly one.

08/05/15

Security and the Internet of Things – are we repeating history?

Security and the Internet of Things – are we repeating history?

The Internet of Things (IoT) refers to the networking of endpoint products and objects that can be accessed via the Internet. The objective of this level of networking is to make our every day experiences more streamlined and...

07/13/15

Number 3 on my top 10 list for security executives: Focus

Number 3 on my top 10 list for security executives: Focus

The threat landscape has evolved. Security solutions have evolved. Has your focus?

11/11/14

Number 2 on my top 10 list for security executives: Reform

There are a number of reforms that can be used to act as a carrot instead of a stick. Reform need not be regulatory mandates that are operationalized as reports used for placating auditors. Examples of ways the federal government can...

09/29/14

Load More