This blog post on developing and retaining team security professionals is part of a multi-part series on designing an information security program in alignment with your most important business objectives. [...]
Check out our webinar from Shane Peden and Christian Hyatt in which they discuss common pitfalls of the CISO role as well as a framework to design a CISO role [...]
Developing a cyber security baseline can be daunting. Oftentimes the burden falls on the Chief Information Officer or Chief Technology Officer. Before implementing any tool or assessments, management should establish a security baseline.
I just finished the book "GRIT: The Power of Passion and Perseverance" by Angela Duckworth. Duckworth is a professor at the University of Pennsylvania and has studied Grit in the [...]
I recently finished the book "Traction" by Gino Wickman. Next to Scaling-Up by Verne Harnish, I think it is one of the most actionable business books I've ever read. Our [...]
Mention "Risk Committee" or "Enterprise Risk" to upper management and you will probably get an eye role. If you suggest a standing meeting about risk - it might get you [...]
Most executives realize that information security (and cybersecurity) is a rising threat within their organization. This is the new normal in the digital economy. As result information security professionals that [...]
Quality Work Does Not Mean Quality Service "Managing the Professional Services Firm" by David Maister is considered to be "core canon" among consulting professionals. Though it was originally published over [...]