Measuring the Efficacy of your Insider Risk Program

For those dealing with insider risks for as long as I have, justifying the mission can feel akin to providing results to Fermat’s Last Theorem.  There are solutions to each challenge, but ...
Doing the Work: How to Architect a Systematic Security Program, Part 3

Doing the Work: How to Architect a Systematic Security Program, Part 3

Building a security program from the ground up is a complicated, complex undertaking that can pay massive dividends down the road. We firmly believe that “the devil is in the details,” in ...
Measuring Up: How to Architect a Systematic Security Program – Part 2

Measuring Up: How to Architect a Systematic Security Program – Part 2

 In Part 1 of this series , we discussed how organizations can go about selecting a framework for implementation. In order to effectively measure your organization against the selected framework, the organization ...

NIST CSF 2.0 Workshop Themes: Praetorian’s View

On 17 August 2022, NIST conducted the first Workshop to organize the effort to update the NIST Cybersecurity Framework (CSF) to version 2.0. Praetorian originally submitted comments to the CSF 2.0 RFI ...

All Security is Cybersecurity

Personal data is collected and used than ever before and in an incredibly diverse number of ways. Traditionally, government and employer ERP systems held our Social Security Numbers, an insurance company database ...

Measure information security

Measuring security is especially important if a company invests a lot of time and efforts in securing their organization. However measuring security is not an easy task, as there are a lot ...