A recent conversation in LinkedIn was suggesting that the role of the CISO needs to be recreated since the role has evolved and the magnitude of the changes means that expectations of the CISO are hampered by the legacy of the past. I do not necessarily agree with the idea that the CISO (Chief Information… Read More
The Journey of Integrating AI into IT Security Operations
AI is going to transform IT Security Operations. The new stage of AI IT Security Ops evolution is here because we can finally use the massive amount of data that AI has given us. But there are some challenges with the current implementations and some changes in how we deliver IT security services to the… Read More
Presented to the ISC2 Cincinnati Tri-State Chapter on the subject of what it takes to be a CISO
I had the wonderful opportunity to to present to the Presented to the ISC2 Cincinnati Tri-State Chapter on the subject of what it takes to be a CISO, on March 15 2022. I provided an outline to help someone determine if they are suited to this career. It included: A Strength, Weaknesses, Opportunities and Risk… Read More
You will get SOAR if you don’t have a good foundation
A critical recipe for success when deploying a SOAR solution, is having a good foundation of Security Business Goals,Processes, Team Roles and Measures of Success. I have been working with many companies, and without these components, its like shooting in the dark, hoping to hit the right target. One of the most popular SOAR use… Read More
Radio Interview on some approaches for securing the home from IT Attacks
Host site: http://cybermattersradio.com/ Interviewer: Mark Graff Link to audio: Episode 5 – Who is your computer talking to?
IT Newsletters available
So as you have probably noticed, I don’t do a lot of blogging. I have some articles in the “hopper” but in the meantime you might be interested in some of the newsletters I generate every couple of days: The OEM Security Newsletter This is focused on finding news around the vendors and players in… Read More
Threat Intelligence Platforms – A short briefing
What Are They? Threat intelligence is an emerging commercial search that provides a security operations team with the ability to ingest threat feeds from multiple sources. What Do They Do? Once “ingested” these solutions can then correlate different threat intelligence sources against each other. This “matching process” was provide a security team with greater assurance… Read More
Short of time… need to keep up with security news that CISOs and IT Security Managers are interested in
Subscribe my week day curated newsalert. Provides you with trends, news and relevant information for IT Security Operations. Used by SOC teams and CISO across the globe. Subscribe to this list
Overcoming “Separation Anxiety” in Moving to an Outsourced IT Model – Part 4
I’ve worked many years in outsourcing and have been brought in to fix a whole lot of different situations. One of the most common problems I’ve noticed over years is the idea of what I like to call the IT version of “separation anxiety” – a situation in which business owners simply cannot give up… Read More
Security Operations: The Right Way to Manage Your SOC Part 1 (Reality check on what it takes to have a SOC)
To do this, let’s just step back briefly and look at what it takes to run an IT security operations team. The first thing you need is a security infrastructure. A set of tools and integrated solutions that allow you to monitor, hopefully automatically detect and block bad things. You need to buy the hardware,… Read More