Mary K. Pratt

Contributing writer

Mary K. Pratt is a freelance writer based in Massachusetts.

Security leaders chart new post-CISO career paths

Security leaders chart new post-CISO career paths

The evolution and growing prominence of the CISO role gives holders more options on where to go next in their careers.

Is your security organization ripe for a reorg?

Is your security organization ripe for a reorg?

CISOs should revisit organizational structure as part of their overall strategic plans and after big shifts in enterprise needs. But experts warn that reorganizing alone isn’t a recipe for success.

Who is your biggest insider threat?

Who is your biggest insider threat?

Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.

MassMutual’s Ariel Weintraub on bringing more intelligence to security

MassMutual’s Ariel Weintraub on bringing more intelligence to security

For the insurance company CISO, a do-it-yourself approach to security analytics and SOC staffing, pays off in increased agility and quicker responses to threats.

VMware’s Karen Worstell: This isn’t a black swan world anymore

VMware’s Karen Worstell: This isn’t a black swan world anymore

Over the past 30 years, several disruptive events have completely changed the practice of security. The challenge for CISOs: take the lessons of the past and apply them to the future.

How WiCyS is taking on security’s image problem

How WiCyS is taking on security’s image problem

Since 2012, Women in Cybersecurity has been breaking down barriers by building a community focused on recruiting, retaining, and advancing women.

6 steps to getting risk acceptance right

6 steps to getting risk acceptance right

Understanding your organization’s risk tolerance is vital for informing cybersecurity strategy. Here’s how to ensure a risk-driven security agenda.

8 keys to more effective vulnerability management

8 keys to more effective vulnerability management

Wherever you are on your journey toward building vulnerability management program, these best practices will help you be more efficient and effective.

Shifting security left at WGU

Shifting security left at WGU

“We have better security success when the developers are taking part in it,” says James Chandler, VP of security for Western Governors University.

How BIC is removing roadblocks for Black security pros

How BIC is removing roadblocks for Black security pros

Blacks in Cybersecurity offers a “spinning wheel of resources” to help its members advance their cybersecurity skills and careers, says founder and CEO Michaela Barnett.

Delta CISO Debbie Wheeler: Security can’t be seen as a competitive advantage

Delta CISO Debbie Wheeler: Security can’t be seen as a competitive advantage

With the complexity and criticality of security in the aviation industry, Wheeler warns against viewing security as a competitive advantage. Instead, she says, a more collaborative approach is required.

CISOs are burned out and falling behind

CISOs are burned out and falling behind

For CISOs experiencing burnout, the impact goes beyond not bringing their A game to work; it puts their organizations at increased risk.

12 CISO resolutions for 2022

12 CISO resolutions for 2022

What are the top security priorities for the year ahead? Here’s what CISOs across industries say are their main objectives.

12 steps to take when there’s an active adversary on your network

12 steps to take when there’s an active adversary on your network

These steps will help you respond quickly, without letting a crisis turn into chaos.

Arm’s vulnerability management program has legs

Arm’s vulnerability management program has legs

CISO Tim Fitzgerald’s vulnerability management program has delivered measured improvements and earned the security team recognition as a business-enablement function.

Collective resilience: Why CISOs are embracing a new culture of openness

Collective resilience: Why CISOs are embracing a new culture of openness

CISOs are finding value in information sharing among trusted, vetted sources. Here’s how they are maximizing the intelligence gathered from these channels.

Lockheed’s Teresa Merklin: There’s no such thing as a quick fix

Lockheed’s Teresa Merklin: There’s no such thing as a quick fix

Forget the silver bullet; focus on cyber resiliency, advises the Lockheed Martin fellow.

Aligning security strategy with ESG objectives: The next big issue for CISOs

Aligning security strategy with ESG objectives: The next big issue for CISOs

As interest in environmental, social, and governance issues increases among investors, business partners, consumers, and employees, CISOs will need to shape their security and risk strategies to align with the organization’s ESG...

TIAA boosts cybersecurity talent strategy with university partnership

TIAA boosts cybersecurity talent strategy with university partnership

CISO Tim Byrd teams up with New York University Tandon School of Engineering to create a new educational pathway for TIAA employees.

Cybersecurity spending trends for 2022: Investing in the future

Cybersecurity spending trends for 2022: Investing in the future

As security budgets continue to rise, where is the money going? Recent surveys offer insight into CISO spending for the year ahead.

Load More