Tag Archives: CISO

Distributed Security for Fun and Profit…

– Global organizations often have challenges creating a comprehensive security program.  Too much central control and the regions either feel ignored, so chafe at security cost allocations and pay only nominal attention to the program, causing great risk to the overall organization.  Or they fill…

Corporate Governance: A Dirty Word or a Dirty Job?

– Corporate governance is in the limelight. No one wanted it, not many embrace it. But it’s here and here to stay, thanks to the horrifying outcomes vis-a-vis criminal activity leading to the failures of Enron, Worldcomm and the likes. In the newly published anthology, CISO Leadership:…

It’s All About the People: Assessing Your Organization’s Network Perimeter (pt. 4)

– Welcome once again to the risk rack. This time on the risk rack we will be continuing our review of how to assess your organization’s network perimeter. As a reminder the identified steps were: Step 1: Define the functions and purposes of your network perimeter. Step 2: Assess the technology…

Assessing your Organization’s Network Perimeter (pt. 3)

– Welcome once again to the risk rack. This time on the risk rack we will be continuing our review of how to assess your organization’s network perimeter. As a reminder the identified steps were: Step 1: Define the functions and purposes of your network perimeter. Step 2: Assess the technology…

Business Drivers For Information Security: Who Needs Them Anyway?

– Security needs to be done to protect the information assets from all the hackers, thieves, criminals and people waiting to steal laptops and data as well as those disgruntled employees that are trying to sabotage the networks, right? Everyone knows that, we need to invest much more money to solve…