Perspectives of a former CISO: Disrupted security in digitalization

Perspectives of a former CISO: Disrupted security in digitalization

| | Uncategorized
My passion is the connection of security to the business objectives, and it has been a part of my work with many CISOs across industries as well as my experience as a CISO. This blog series a compilation of my learnings as a CISO, as well as learnings from peers ... Read More
Driving data security is a shared responsibility, here’s how you can protect yourself

Driving data security is a shared responsibility, here’s how you can protect yourself

| | Uncategorized
You’re driving a long, dark road on a rainy night. If you’re driving 20 miles over the speed limit and you don’t step on the brakes when the car in front of you comes to a sudden stop, is it your fault or your car manufacturers fault if you rear-end ... Read More
Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

| | Uncategorized
The Microsoft Cybersecurity Reference Architecture describes Microsofts cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help you better utilize it. How to use it We have ... Read More

From the ground up to the cloud: Microsoft’s Intelligent Security supporting CISOs’ cloud transformation

| | Uncategorized
Its no secret that Microsoft has embraced the cloud in a big wayfrom enterprise solutions like Microsoft Azure to Office 365 and Windows. But a recent research report by Forrester focuses on an equally important shift in our approach to securityintegrating workforce and cloud security in ways that make them ... Read More

Here is Homeland Security, black swans, and thwarted cyberattacks

| | Uncategorized
Last week, I had the honor of addressing The Homeland Security Training Institute (HSTI) at the College of DuPage as part of the HSTI Live educational series. The event featured other prominent speakers at the forefront of cybersecurity defense, including: Dave Tyson, CEO of CISO Insights, a global cybersecurity consultant ... Read More
Overwhelmed by overchoice at RSA Conference 2018

Overwhelmed by overchoice at RSA Conference 2018

As over 500 companies vied for mindshare at this years RSA conference – a cacophony of vendors pitching thousands of products from brightly colored booths – it reminded me of how challenging it was for me to separate signal from noise when I was managing global networks. And the rapid ... Read More

Tapping the intelligent cloud to make security better and easier

There has been a distinct shift in my conversations with customers over the last year. Most have gone from asking can we still keep our assets secure as we adopt cloud services?, to declaring, we are adopting cloud services in order to improve our security posture. The driving factor is ... Read More
Investing in the right innovation

Investing in the right innovation

| | Uncategorized
RSA is around the corner which means tens of thousands of people will descend on Moscone Center in San Francisco, CA. Hundreds of innovative young companies will look for customers, props, and capital (especially at the Early Stage Expo!). Venture capitalists will look for opportunities to invest and find the ... Read More
Announcing: new British Standard for cyber risk and resilience

Announcing: new British Standard for cyber risk and resilience

| | Uncategorized
Technology is an integral part of the fabric of everyday life. There is almost no organization that does not rely on digital services in some way in order to survive. The opportunity that technology provides also brings with it more vulnerabilities and threats as organizations and data become more connected ... Read More

Working towards a more diverse future in security

Last year I embarked on an exercise to examine diversity in cybersecurity. As one full year has passed, I decided to revisit this topic and the ongoing challenges of recruiting AND retaining diverse talent in the cybersecurity field. This past year saw the #MeToo movement in the spotlight, and while ... Read More
Loading...