CISO Suite
Overcoming our “bossypants” bias
This is the fifth post in a series of posts inspired by reading Sheryl Sandberg's book, Lean In: Women, Work, and the Will to Lead. We've previously looked at some of Sandberg's evidence That women are underrepresented ...
How to Customize a Risk Register Template for Your Needs
Cybersecurity threats are rising, posing significant challenges to organizations that strive to protect their assets and maintain compliance. As projects get more complicated, keeping track becomes difficult at best and dangerous at ...
What’s the cause of the problem part two
This is the fourth post in a series of posts inspired by reading Sheryl Sandberg's book, Lean In: Women, Work, and the Will to Lead. Previously we discussed lack of confidence as one of the causes ...
Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule
The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...
Security Boulevard
What’s the Cause of the Problem?
This is the third post in a series of posts inspired by reading Sheryl Sandberg's book, Lean In: Women, Work, and the Will to Lead. In the previous post, I shared some of the statistics ...
Updating Your Risk Assessment Process for the Modern Era of GRC
Mastering the risk assessment process in the dynamic Governance, Risk, and Compliance (GRC) landscape is fundamental for your business’s stability and growth. Starting from scratch or regularly updating your risk register might ...
A CISO’s Guide to SaaS Security Posture Management
As today’s security threat environment evolves, SaaS security posture management (SSPM) has become a key part of a CISO's security defense plan ...
Security Boulevard
Risk Management Strategy in an Economic Downturn: How to Take a Holistic Approach to GRC
Economic uncertainty has been a hot topic for all businesses lately. The good news: the US economy might have avoided a recession, and rising interest rates haven’t slowed economic growth. However, bad ...
Getting Ahead of Cybersecurity Materiality Mayhem
Cybersecurity leaders must differentiate between strategic (material) and tactical threats in a cross-functional manner and determine 'materiality.' ...
Security Boulevard
Lost to the Highest Bidder: The Economics of Cybersecurity Staffing
When it comes to cybersecurity talent, supply and demand economics are amplified far beyond what is experienced in other fields ...
Security Boulevard