Homepage
Open in app
Sign in
Get started
CISO & Cyber Leaders
A community for sharing cyber security leadership topics and issues
Follow
Are You As An Infosec Leader Ready To Sit At the Executive Adult Table?
Are You As An Infosec Leader Ready To Sit At the Executive Adult Table?
So, information security finally has a seat at the same table as the other executives. That seat is at the metaphorical adult’s table and…
Opinionated Security
Feb 25, 2021
Seven Hard Realities of Application Security For Non-Developers — Part 2
Seven Hard Realities of Application Security For Non-Developers — Part 2
Long the domain of ex-developers, application security as its own discipline is maturing and beginning to gain interest from traditional…
Opinionated Security
Feb 18, 2021
What InfoSec Pros Are Getting Wrong With Cyber Risk Acceptance Forms
What InfoSec Pros Are Getting Wrong With Cyber Risk Acceptance Forms
As information security professionals, we love the easy answers when easy is available. We should because, well, there is so little that…
Opinionated Security
Jan 26, 2021
Seven Hard Realities of Application Security For Non-Developers — Part 1
Seven Hard Realities of Application Security For Non-Developers — Part 1
Application security is finally getting the visibility the discipline deserves. Multiple blog posts and new books are bringing the craft…
Opinionated Security
Jan 5, 2021
Servant Leadership In Cyber Security
Servant Leadership In Cyber Security
Servant leadership seems to be a growing buzzword in cyber security.
Opinionated Security
Jan 1, 2021
Stuff &Things: Non-Measurable Activities Within Infosec Programs
Stuff &Things: Non-Measurable Activities Within Infosec Programs
As cyber practitioners, we are often keen on activity. The problem is that activity doesn’t always move our cyber program if the activity…
Opinionated Security
Dec 30, 2020
Are We Starting to Abdicate Cyber Leadership To Consultants?
Are We Starting to Abdicate Cyber Leadership To Consultants?
The internet makes finding examples of sound leadership principles easy. Finding examples of great leadership within the cyber security…
Opinionated Security
Dec 27, 2020
A CISO View: How To Communicate Security Alert Coverage And Quality
A CISO View: How To Communicate Security Alert Coverage And Quality
Presenting complex programs such as 24x7 monitoring is often a multi-slide exercise that does little to help executives or the Board to…
Opinionated Security
Dec 24, 2020
Sometimes That Cyber Risk Shouldn’t Be So Quickly Accepted
Sometimes That Cyber Risk Shouldn’t Be So Quickly Accepted
Is the cyber security team performing their duty, if, without further action, they accept any cyber risk that could potentially put the…
Opinionated Security
Dec 23, 2020
The Legend Of Blue Team Pat
The Legend Of Blue Team Pat
In the bosom of one of those spacious second-tier digitally transformed technology tax zones that dot the coast, you can find the small…
Opinionated Security
Dec 22, 2020
7 Design Patterns To Detect When There Is Drift From Security Policies
7 Design Patterns To Detect When There Is Drift From Security Policies
Good standards governance requires the definition of sound policies that include both best practice and good practice. But, defining…
Opinionated Security
Dec 17, 2020
Application Security Isn’t A Business Advantage Until You Frame It As One
Application Security Isn’t A Business Advantage Until You Frame It As One
Leading a successful application security program would be so much more effective and easy if there was a “security as a business…
Opinionated Security
Sep 1, 2020
Yes. Cyber Leaders Can Reduce Distracting Work
Yes. Cyber Leaders Can Reduce Distracting Work
Distracting work. Disruptive work. Unplanned work. Call it what you want.
Opinionated Security
Jun 25, 2020
Are You And Your Cyber Security Team Staying Too Busy By Choice?
Are You And Your Cyber Security Team Staying Too Busy By Choice?
How often do you hear about cyber security teams being busy to the point of being overworked? I’d say fairlyoften. People tell me that…
Opinionated Security
Feb 17, 2020
How To Quantify Cyber Risk In A (Somewhat) Simple Way
How To Quantify Cyber Risk In A (Somewhat) Simple Way
Every record in every machine and instance in your organization’s infrastructure has a value. The 2019 IBM Ponemon Report estimates the…
Opinionated Security
Feb 12, 2020
Change Your Mindset To Successfully Defend The Cloud
Change Your Mindset To Successfully Defend The Cloud
There is a bit of comfort for cyber security blue teams in defending traditional physical infrastructure. We’ve known how to defend legacy…
Opinionated Security
Feb 2, 2020
It’s Time To Deal With Cyber Security’s High Hanging Fruit
It’s Time To Deal With Cyber Security’s High Hanging Fruit
Starting or re-building a cyber security program by focusing on low hanging fruit makes a lot of sense. As the most popular metaphor for…
Opinionated Security
Feb 2, 2020
The Problem With Cyber Security Being Everyone’s Job
The Problem With Cyber Security Being Everyone’s Job
The cyber security consultants and social media luminaries like to say that “cyber security is everyone’s job.” A great statement and…
Opinionated Security
Feb 1, 2020
Is Your Cyber Team Trying To Own Too Much?
Is Your Cyber Team Trying To Own Too Much?
A great thread on Twitter recently asked, “what would be the first 3 things you’d do if a company hires you to help them improve their…
Opinionated Security
Jan 27, 2020
A Cyber Security Message In A Bottle
A Cyber Security Message In A Bottle
It’s natural that orgs will fall back to bad or even unsafe practice even after governance is put in place. That movement can be fast and…
Opinionated Security
Jan 26, 2020
Cyber Security Can Learn From Physical Security
Cyber Security Can Learn From Physical Security
Our physical security colleagues seem to understand some things better than cyber security practitioners. This better understanding tends…
Opinionated Security
Jan 25, 2020
Building That Mythical Cyber Security “A” Team
Building That Mythical Cyber Security “A” Team
Hiring a great cyber security team is hard. My view in this post is from a cyber security management and executive perspective as I’m not…
Opinionated Security
Jan 15, 2020
Setting Conditions For Cyber Wins
Setting Conditions For Cyber Wins
Sun Tzu, the great military philosopher once wrote, “”every battle is won or lost before it’s ever fought”. Back in my day, this military…
Opinionated Security
Jan 12, 2020
Building A Cyber Security Culture Requires Goodwill
Building A Cyber Security Culture Requires Goodwill
Imagine a world in which cyber security programs could generate goodwill instead of obstacles.
Opinionated Security
Jan 9, 2020
Be the Bug Or The Windshield
Be the Bug Or The Windshield
There is an old leadership metaphor about having the choice of being a bug or being the windshield.
Opinionated Security
Jan 4, 2020
About CISO & Cyber Leaders
Latest Stories
Archive
About Medium
Terms
Privacy
Teams