Wanna find a blueprint for a truly effective cybersecurity team? You could do a lot worse than watching the original Avengers movie a few (dozen) times. Over the weekend, my kids (5 and 3) were on a bit of superhero kick, and I realized again how brilliant the first Avengers movie was—not just in the […]
The horse called Architecture is gonna race, no matter what
One of the things I saw recently was a clip from the 2017 Royal Ascot race where a horse called Growl somehow unseated his jockey in the starting gate, yet he ended up running the whole race solo. It’s kind of an amusing story, and one that shows the power of constant training, repetition and […]
Playing well with the good little ERM children
Two of the potentially challenging things about doing information and cyber security risk assessments are being able to easily leverage any existing risk assessments done by other areas of the organization and being able to integrate the risk assessments we do with the existing risk ratings already being compiled and aggregated by the ERM team—assuming […]
Man vs. machine: where are you going to put your faith?
Yada, yada, yada…AI…big data…security tools…ever increasing threats…AI for good and evil…keeping ahead of the bad guys…yada, yada, yada. That’s a pretty good summary of the security “news” I get in my inbox most days, but on this particular day, I was told that “advanced, AI-based security tools are the only way to plan your defense […]
Getting past the possibility (or why threat-based security will get you nowhere)
Yesterday, I was re-reading the FAIR book, Measuring and Managing Information Risk: A FAIR Approach, and something jumped out at me that I’d forgotten the first time I’d read it. The notion of getting hooked on the possibility of an event. Of course, the FAIR book poo-poos all over the qualitative risk assessment – and, […]
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- 9
- …
- 57
- Next Page »