Menu

risk management

Waking Up to Cybersecurity’s New COVID-19 Reality

The COVID-19 pandemic is creating emergent risks and cybersecurity challenges. Chief Information Security Officers (CISOs) and other security organization leaders are on the firing line, finding themselves responsible for everything from remote access security to business continuity management (BCM) to… Continue reading

Place Information Risk Accountability at the Right Level

Too often, information risk accountability isn’t at the right level due to poor alignment between security and business leaders. It’s time to transform the way we communicate risk to the business. When the security program struggles with an issue, bring… Continue reading

Rational Cybersecurity Open Access Book Announcement

Exciting News: I found the perfect publisher for Rational Cybersecurity for the Business. Apress, a Springer Nature company, will be publishing my book in May 2020 through the ApressOpen program. This means the industry’s first comprehensive Security Leader’s Guide… Continue reading

Cybersecurity Deficit: More than a Skills Shortage

New Services to Cut the Cybersecurity Strategy Deficit

As 2020 gets underway, we’re excited to announce a more modular and agile cybersecurity, identity management, and risk management consulting services catalog. More than ever the world needs rational cybersecurity leadership, business… Continue reading

FAIRCON Showcases Quantitative Risk Analysis on the Cusp of Adoption

At FAIRCON 2018, keynote speakers described FAIR as a quantitative risk analysis “movement” to change the way industry measures and manages risk. Deep, ongoing frustration in business and government circles with the seeming inability of increased cybersecurity spending to stop… Continue reading

The New Vulnerability and Risk Management (VRM) Paradigm: Holistic, Dynamic, Adaptive

The ability to perform effective Vulnerability Risk Management (VRM) is an important marker of IT security maturity. Why? Managing the flow of vulnerabilities in complex IT environments is a major challenge. So is recognizing, categorizing, and prioritizing IT security risks.… Continue reading

Subscribe to Blog Notifications...  HERE
Archives