How to Interview People for Grit
I just finished the book "GRIT: The Power of Passion and Perseverance" by Angela Duckworth. Duckworth is a professor at the University of Pennsylvania and has studied Grit in the [...]
I just finished the book "GRIT: The Power of Passion and Perseverance" by Angela Duckworth. Duckworth is a professor at the University of Pennsylvania and has studied Grit in the [...]
For the past 5 years, risk3sixty has helped hundreds of organizations implement ISO programs and get certified. We help write policies, perform risk assessments, interface directly with external auditors during [...]
For the past 5 years, risk3sixty has helped hundreds of organizations implement ISO 27001 and ISO 27701 programs and get certified. We help write policies, perform risk assessments, interface directly [...]
If you are looking for insights about the intersection of cybersecurity, compliance, and security program lifecycle management, the Tuesday Morning Grind is the podcast for you. Each week, Christian Hyatt [...]
Check out our webinar from Shane Peden and Christian Hyatt in which they discuss how to design a security program budget and get it approved. https://youtu.be/Q4LAtW5WqYk
This blog post on developing and retaining security professionals at your high growth technology company is part of a multi-part series on designing an information security program in alignment with [...]
Check out our webinar from Shane Peden and Christian Hyatt in which they discuss how to optimize your organizational structure to seamlessly overlay security and compliance without burdening your leadership team. [...]
This blog post on developing a security program budget is part of a multi-part series on designing an information security program in alignment with your most important business objectives. CISO [...]
This blog post on developing a security program budget is part of a multi-part series on designing an information security program in alignment with your most important business objectives. You [...]
This blog post is part of a multi-part series on designing an information security program that aligns with your most important business objectives. You can also watch the recorded webinar [...]