A CISO’s Guide to Building a Strategic Relationship with the BOD

A chief information security officer’s (CISO’s) role ultimately is to help their organization’s board of directors (BOD) understand the potential impact of cyber threats on the organization. When this strategic relationship is ...
Doing the Work: How to Architect a Systematic Security Program, Part 3

Doing the Work: How to Architect a Systematic Security Program, Part 3

Building a security program from the ground up is a complicated, complex undertaking that can pay massive dividends down the road. We firmly believe that “the devil is in the details,” in ...
Measuring Up: How to Architect a Systematic Security Program – Part 2

Measuring Up: How to Architect a Systematic Security Program – Part 2

 In Part 1 of this series , we discussed how organizations can go about selecting a framework for implementation. In order to effectively measure your organization against the selected framework, the organization ...
Framework Selection: How to Architect a Systematic Security Program – Part 1

Framework Selection: How to Architect a Systematic Security Program – Part 1

A need for public trust in information systems has driven continuous technological advances and new regulatory requirements, which have in turn made the global cyber threat landscape more complex and connected (see ...

Part 3 – Trends in the Cybersecurity Talent Marketplace in the Face of Sustained Shortages

I’ve written previously about how I believe a team’s expertise and talent are the most important factors in determining the success of a cybersecurity program. I’d like to elaborate a bit more ...

Part 2 – Adapting Security Strategy to the Rise of Opportunistic Attacks

Over the past two years, we’ve seen a number of our clients’ security programs re-orient to prepare for potential ransomware incidents. Much of these preparations have focused on the controls and processes ...