Mario PlattSocial Practice Theory and Cyber SecurityLet’s start with some housekeeping. If you came here looking for methods or answers you can apply tomorrow, I’m afraid you’ll be…May 4, 2020May 4, 2020
Mario PlattSocial practices and Timespan of Discretion in Cyber SecurityIf you’ve been following me for long enough, you’ll know I’m a massive fan of Jabe Bloom work, particularly on Sociotechnicity and Design…Feb 18, 2020Feb 18, 2020
Mario PlattWhy your security policies are a business liability and what to do about itI’ve been having quite a few conversations lately along these lines, making a case that many (if not most or all) of the security policies…Feb 5, 2020Feb 5, 2020
Mario PlattAnthro-Complexity and Cyber SecurityI’ve been meaning to write about Anthro-complexity and Cynefin framework and making a quick introduction to what it is, how it works and…Jan 29, 2020Jan 29, 2020
Mario PlattInfoSec view of the DSG Retail ICO fineDISCLOSURE: I used to work for Dixons Carphone Group (DCG) around the time of this second breach with a senior security role, however I…Jan 22, 20201Jan 22, 20201
Mario PlattHacking contracts for fun and profitOne of the big challenges for Information Security, particularly in organisations which have major outsourced IT contracts from the global…Jan 14, 2020Jan 14, 2020
Mario PlattSecurity process improvement or how I saved an org > £1M/yearThis situation I’m referring to happened about 7 years ago. I tell it not so much because of ‘the thing itself’ but as a tale of the type…Jan 10, 2020Jan 10, 2020
Mario PlattThreat modelling in a post-C.I.A world — focus on D.I.EA while ago I created the following Wardley map of Threat Modelling. You can find the actual MapScript code for this map (where in the…Jan 7, 2020Jan 7, 2020
Mario PlattSecurity for the 2020s: The Skills and Talent problemIf you’ve been following security news and any prominent security speakers for the past year or two, you’ll certainly have come across 2…Dec 30, 2019Dec 30, 2019