Building a Healthy Security Culture: Insights from Kai Roer

Building a Healthy Security Culture: Insights from Kai Roer

In this episode we speak with Kai Roer, a renowned author, security culture coach, and CEO of Praxis Security Labs. Kai shares his career journey in cybersecurity and emphasizes the importance of ...
Considerations for merging your IT and OT environments into ICS

Considerations for merging your IT and OT environments into ICS

Many organizations straddle the barrier between two different worlds: the Operational Technology (OT) world of physical machinery, manufacturing systems, SCADA, […] ...
Risk Assessment: The Crucial Element Of A Successful Security Implementation Program

Risk Assessment: The Crucial Element Of A Successful Security Implementation Program

The advancement of technology leaves no scope for negligence when it comes to data protection. Organizations, understanding the urgency of the matter, implement sturdy cybersecurity practices in place, but can the appropriate ...
Qualys tactical CISO

Top 5 Tactical Steps for a New CISO

A CISO must get a strategic and tactical bearing on their new role, company and the security program they are inheriting, leading and developing. This article will focus on the tactical priorities ...
Security Boulevard
security third-party supply chainCISO role

Is Leadership Paying Attention to Your Security?

What do successful cybersecurity programs have in common? According to new research from Deloitte and the Financial Services Information Sharing and Analysis Center (FS-ISAC), they have the attention of executive and board ...
Security Boulevard
Insurance Occurrence Assurance?

Insurance Occurrence Assurance?

The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection ...

CISO toolbox: The tools every CISO should know

Like in every profession, good tools are already half the work. The other half however, is getting the right tool, at the right moment and using it, correct, in the right way ...

Big data analytics = Big security

In the last years big data has become a hot subject in the field of information technology and gaining more attention from our senior management. Companies are working on this “new” concept ...

How to implement security metrics

Assets are the most important pieces to an organization. Protecting them is crucial to maintain the value of these assets. But what about assigning a value to the protection measures? By means ...