Security Connections
Monarch Information Networks provides information security management services and expert witness services.
The First National Cybersecurity Summit
On July 31, 2018 I attended the first National Cybersecurity Summit at the US Customs House in lower Manhattan. The building itself was constructed around 1902 1907 in order to collect tariffs ...

New Privacy Laws Require Security Professionals Up Their Game
Two recent privacy laws GDPR and the California Consumer Privacy Act (AB 375) focus more attention on protecting digital privacy of individuals. Both laws will require that security professional up their game ...
Cybersecurity Workforce Development: Real or Imagined Problem?
Yesterday DHS and the Commerce Department released their most recent workforce report Supporting the Growth and Sustainment of the Nation s Cybersecurity Workforce . The report was commissioned by the Trump administration ...

Antidote for Fake Everything
In this digital era, anything can be faked; followers, news, experts, emails and so on. The possibilities are limited only by the imagination of the faker. It turns out that these issues ...

Information Security Risks, Gray Rhinos and Black Swans
Information security over the past few years has been obsessed with zero day vulnerabilities, hacking exploits and headline making mega breaches. Every security risk manager is looking for the unknown unknowns that ...
Managing Information Security On a Limited Budget
The recent government shutdown got me thinking about budgets and information security. Having just submitted a proposal to a small business myself, I am asking the question: What is best practice for ...
Building a Security Start-Up
If only building a security start up was as predictable as transitioning from caterpillar to butterfly! But, it s not. Unfortunately it usually requires many turns and corresponding changes. Consider companies like ...
Cybersecurity Risk Management for Directors
There are many posts on corporate directors responsibilities toward the organizations where they are board members. In fact, corporate directors themselves may be targets for hacktivists or cybercriminals and need to make ...
Should Your CIO Learn to Code?
This topic came up because of two recent headlines and one new book. The first was the news that the now former Equifax CISO was a music major, without formal college level ...
How IT Leaders Can Keep a Seat at the Table
In this era of digital disruption, business leaders are turning to technology to keep up. But, will they continue to turn to traditional IT leaders to map out the future? This is ...