Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out (Part 2 of 3)

Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out (Part 2 of 3)

| | security posture
This is the Part 2 of a 3-part blog on how to use the NIST cybersecurity framework without getting bogged down and lost in the minutia of the specification documents. Part 1 ...
4 Things Every CISO Must Include in Their Board Presentation

4 Things Every CISO Must Include in Their Board Presentation

| | security posture
For the most part, CISOs today have the attention of their board of directors. This is great! However, many cybersecurity leaders lose track of 3 important facts when it comes to presenting ...
Patch Tuesday Update – November 2020

Patch Tuesday Update – November 2020

| | security posture
Patch Tuesday Advisory (November 2020): Can we say Remote Code Execution? After a light October, it’s back to business as usual with 112 vulnerabilities patched, up from a paltry 87 last month ...
5 Mistakes CISOs Make in Their Board Presentations

5 Mistakes CISOs Make in Their Board Presentations

As a cybersecurity leader, you generally receive only a short time window in the board meeting for your update. During this time, you need to communicate key risks and remediation tactics, explain ...
What NOT to Do in Your First 90 Days as a CISO

What NOT to Do in Your First 90 Days as a CISO

Recently, Daniel Hooper, CISO at Varo Bank asked his LinkedIn network what their recipe for the first 90 days as a CISO would be. The post got 50+ responses but one that ...
End that Zoom call and take a step back…

End that Zoom call and take a step back…

| | security posture
If you are the CISO of a mid-sized enterprise, end that zoom call and take a step back. You probably spent 60+ hrs in Zoom meetings this week. Your team has been ...
The Big Lie in Threat Hunting

The Big Lie in Threat Hunting

Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very ...
The Big Lie in Threat Hunting

The Big Lie in Threat Hunting

Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very ...
Security Awareness Training: How Often Should Your Employees Get Retrained?

Security Awareness Training: How Often Should Your Employees Get Retrained?

Almost every company has some sort of security training, along with several other training prompts to complete during the new hire process. But once initial training is complete, how often should you ...
Security Awareness Training: How Often Should Your Employees Get Retrained?

Security Awareness Training: How Often Should Your Employees Get Retrained?

Almost every company has some sort of security training, along with several other training prompts to complete during the new hire process. But once initial training is complete, how often should you ...