Syndicated Blog

Security Connections
Monarch Information Networks provides information security management services and expert witness services.

The First National Cybersecurity Summit

On July 31, 2018 I attended the first National Cybersecurity Summit at the US Customs House in lower Manhattan. The building itself was constructed around 1902 1907 in order to collect tariffs ...
New Privacy Laws Require Security Professionals Up Their Game

New Privacy Laws Require Security Professionals Up Their Game

Two recent privacy laws GDPR and the California Consumer Privacy Act (AB 375) focus more attention on protecting digital privacy of individuals. Both laws will require that security professional up their game ...

Cybersecurity Workforce Development: Real or Imagined Problem?

Yesterday DHS and the Commerce Department released their most recent workforce report Supporting the Growth and Sustainment of the Nation s Cybersecurity Workforce . The report was commissioned by the Trump administration ...
Antidote for Fake Everything

Antidote for Fake Everything

In this digital era, anything can be faked; followers, news, experts, emails and so on. The possibilities are limited only by the imagination of the faker. It turns out that these issues ...
Information Security Risks, Gray Rhinos and Black Swans

Information Security Risks, Gray Rhinos and Black Swans

Information security over the past few years has been obsessed with zero day vulnerabilities, hacking exploits and headline making mega breaches. Every security risk manager is looking for the unknown unknowns that ...

Managing Information Security On a Limited Budget

| | Connecting the Dots
The recent government shutdown got me thinking about budgets and information security. Having just submitted a proposal to a small business myself, I am asking the question: What is best practice for ...

Building a Security Start-Up

| | Connecting the Dots
If only building a security start up was as predictable as transitioning from caterpillar to butterfly! But, it s not. Unfortunately it usually requires many turns and corresponding changes. Consider companies like ...

Cybersecurity Risk Management for Directors

| | Connecting the Dots
There are many posts on corporate directors responsibilities toward the organizations where they are board members. In fact, corporate directors themselves may be targets for hacktivists or cybercriminals and need to make ...

Should Your CIO Learn to Code?

| | Connecting the Dots
This topic came up because of two recent headlines and one new book. The first was the news that the now former Equifax CISO was a music major, without formal college level ...

How IT Leaders Can Keep a Seat at the Table

| | Connecting the Dots
In this era of digital disruption, business leaders are turning to technology to keep up. But, will they continue to turn to traditional IT leaders to map out the future? This is ...