Pete Lindstrom

Pete Lindstrom is a cyber strategist, innovator, and economist at Spire Security, where he specializes in enhancing the efficiency and effectiveness of cybersecurity programs. He is best known as an authority on strategic cybersecurity topics such as metrics, estimating risk, and measuring the benefit of security programs. Pete has over 25 years of cybersecurity experience as an IT auditor (PwC), IT security practitioner (Wyeth), and industry analyst (IDC). Pete served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame.

What does it mean for cybersecurity to “align with the business

Cybersecurity metrics corporate boards want to see

Cybersecurity metrics corporate boards want to see

These are the metrics that boards of directors will find useful because they help map security investments with strategic goals and risks.

A formula for measuring real-world email security efficacy

A formula for measuring real-world email security efficacy

You have the data needed to assess the efficacy of your email security tools. Here's how to use it.

Tracking incident alerts: Is 24 trillion a large number?

Tracking incident alerts: Is 24 trillion a large number?

Large enterprises might monitor millions or even billions of security signals a day. At that scale, you need to set expectations about detection failures.

Real-time is where the cybersecurity risk is

Real-time is where the cybersecurity risk is

The massive volume of network transactions, messages and other events that occur in real time makes predicting the risk of an incident difficult, but not impossible.

What can March Madness and 538 teach us about cybersecurity risk?

What can March Madness and 538 teach us about cybersecurity risk?

The 538 March Madness prediction website has used data analytics to change the way fans watch the game. Cyber risk quantification can do the same for security leaders.

Yes, you can measure cybersecurity efficacy

Yes, you can measure cybersecurity efficacy

Recent examples show that AI and other measurement tools can provide meaningful assessments. Time to make cybersecurity efficacy a thing.

A 10-point plan for addressing WFH cybersecurity challenges

A 10-point plan for addressing WFH cybersecurity challenges

Back in early Spring, ensuring users could access the necessary applications securely from home was priority No. 1. Now, 3-4 months later, work from home looks like it's here to stay … for a while, at least. Here's your to-do list for...

Building out your strategic security metric framework

To define your framework, take Willie Sutton's advice and go where the money is. In our case, risk and security lay with the IT and information assets in our environment.

Truth and Fiction about Microsoft's 'Palladium'

Spire Security says Microsoft's Next Generation Secure Computing Base (NGSCB) strategy has gotten a bad rap, and it's time to set the record straight.

The More Things Change, the More They Stagnate

The security industry began the year with some momentum, primarily because of Code Red's and Nimda's wakeup call. Certainly, 9/11 had an impact on the pundits, who assumed that information security would benefit (a nauseating idea,...

Load More