facebook_pixel

Category: Security Leadership

Top 3 Leadership Pitfalls in a Security Operations Center

Top 3 Leadership Pitfalls in a Security Operations Center

Security Operations Centers (SOC) provide businesses with the ability to see what’s going on in order to respond accordingly. SOC teams rely on the ability to learn skills and processes on-the-fly to meet expectations from stakeholders across the business and combat...

The Security Perception Versus Reality

In today’s hyper connected digital world, information technology reigns absolute. A long standing and critical strategy for businesses is to safeguard their intellectual property, financial information, and reputation. Yet in just about every vertical market,...

Security Means Managing What You Already Own First

A trend that I have picked up on in conversations with CIO’s, CISO’s and other leaders responsible for securing the enterprise is the huge gap between what they need and what many vendors are marketing. Security leaders in the trenches need solutions to optimize and...

The Sony Breach and The U.S. Government’s Responsibility to Act

The last week or so marks what I would describe as an unprecedented shift in the impact of cyber attacks with the Sony breach. I run from the constant fear, uncertainty and doubt (FUD) that gets circulated and recirculated by vendors and media outlets but I see this...

You Can’t Do It Alone

When I was a CISO for a global defense company, I realized that a company of any significant size or complexity could never “do” security for themselves. Why can’t big companies go it alone? Partly because of specific resources and expertise that is not resident...

5 Things You Should Do Right Now To Reduce Risk

Due diligence and fiduciary responsibility for corporate executives is now widely acknowledged to include exercising sound judgment and effective controls in the domain of cyber security. There’s no escaping the responsibility to protect corporate information and...

Contact Cybersheath

By completing this form, I consent to receiving calls, texts and/or emails from Cybersheath regarding services and programs.