A recent conversation in LinkedIn was suggesting that the role of the CISO needs to be recreated since the role has evolved and the magnitude of the changes means that expectations of the CISO are hampered by the legacy of the past. I do not necessarily agree with the idea that the CISO (Chief Information… Read More
The Journey of Integrating AI into IT Security Operations
AI is going to transform IT Security Operations. The new stage of AI IT Security Ops evolution is here because we can finally use the massive amount of data that AI has given us. But there are some challenges with the current implementations and some changes in how we deliver IT security services to the… Read More
Presented to the ISC2 Cincinnati Tri-State Chapter on the subject of what it takes to be a CISO
I had the wonderful opportunity to to present to the Presented to the ISC2 Cincinnati Tri-State Chapter on the subject of what it takes to be a CISO, on March 15 2022. I provided an outline to help someone determine if they are suited to this career. It included: A Strength, Weaknesses, Opportunities and Risk… Read More
You will get SOAR if you don’t have a good foundation
A critical recipe for success when deploying a SOAR solution, is having a good foundation of Security Business Goals,Processes, Team Roles and Measures of Success. I have been working with many companies, and without these components, its like shooting in the dark, hoping to hit the right target. One of the most popular SOAR use… Read More
Radio Interview on some approaches for securing the home from IT Attacks
Host site: http://cybermattersradio.com/ Interviewer: Mark Graff Link to audio: Episode 5 – Who is your computer talking to?
IT Newsletters available
So as you have probably noticed, I don’t do a lot of blogging. I have some articles in the “hopper” but in the meantime you might be interested in some of the newsletters I generate every couple of days: The OEM Security Newsletter This is focused on finding news around the vendors and players in… Read More