Person on a computer working.

CISO Life: How Are You Holding Up?

As a consultant, I’ve been advising and supporting security leaders like Chief Information Security Officers (CISOs) for several years now. I’m always intrigued by the organizational nuances of each role and each person in the seat. Let’s face it: being a CISO is not an easy job. To be successful in the role requires a lot of support from executive… Read More

Image of a computer, on a desk and a mouse.

How Regular Cyber Security Assessments and Audits Help Your Organization

Understanding your weaknesses through regular cyber security assessments and audits is critical. Without them, it’s difficult to withstand cyber attacks and protect your organization. As the wise Japanese author Shusaku Endo noted, ““Every weakness contains within itself a strength.” Knowing your weaknesses helps you focus on what you need to do to improve your cyber security posture…. Read More

How to Build a Better Cyber Security Program for Your University

How to Build a Better Cyber Security Program for Your University

Colleges and universities face some unique challenges when it comes to building a cyber security program. From an ideological standpoint, university campuses are founded on the concept of the free and open exchange of ideas and information. However, universities today must balance this with the day-to-day reality of securing a vast range of critical data… Read More

Image of lock hovering above a phone or mobile device.

When I Was the Target of a Social Engineer

While conducting assessments and incident response exercises, I’ve talked to many clients about cyber security training, including how to avoid being a target of social engineering. Cyber security training covers a broad range of potential topics – everything from current threats to cyber hygiene to information assurance and organizational policies, and training employees and other… Read More

A person completing a banking transaction.

How New Banking Regulations are Changing Risk Management

Ask a financier, a telco CEO, and a cyber security analyst about the impact of new banking regulations to risk management policies, and you’ll very likely get three different answers. Everything from how banks – and companies with banking functions – must govern their organizations, to how they can ‘use’ their clients’ money. Banking regulations… Read More

Images of security surrounding a laptop computer.

The Skills and Qualifications Incident Response Professionals Need to be Successful

One of our most popular blog posts covers the skills and qualifications required to be a successful penetration tester, so we decided to follow up with a similar post outlining the skills and qualifications incident response professionals need. It’s a commonly known fact that cyber security is a growing industry and organizations are always looking for new talent. Incident… Read More