Alan Levine
CISO Blogs
Andreas Wuchner: A Cyber Risk Guide for Humans
Andreas Wuchner
Darrell Jones: Data – The New Frontier
Darrell Jones
Jack Sullivan: Stagehand – A Fictional Crime Drama
Jack Sullivan
Sergej Epp: Top of the SOC
Sergej Epp
Recent Articles
Stagehand: S1 Episode 8
Keith and I left the scene like we found it: the two kidnappers dead on the floor, their shotgun up against the wall, and the rope used to tie up Carl Timmons sprawled out on the floor. We tipped off local law enforcement and were gone before they arrived, leaving no trace we were ever there.
Stagehand: S1 Episode 7
Keith and I left the scene like we found it: the two kidnappers dead on the floor, their shotgun up against the wall, and the rope used to tie up Carl Timmons sprawled out on the floor. We tipped off local law enforcement and were gone before they arrived, leaving no trace we were ever there.
Stagehand: S1 Episode 6
Keith and I left the scene like we found it: the two kidnappers dead on the floor, their shotgun up against the wall, and the rope used to tie up Carl Timmons sprawled out on the floor. We tipped off local law enforcement and were gone before they arrived, leaving no trace we were ever there.
What Is Zero Trust Anyway?
The difference between the success and failure of a data classification program is a lack of action. The purpose of this blog post is to provide you with enough background and understanding to develop a plan. Here is a framework, something to develop into a plan and intelligently pitch to senior management. The following will give you the tools to persuade the required business leaders to implement a successful Data Classification program.
Why Bots Are the Next Big Thing in Account Takeover Fraud
Automated measuring of control effectiveness is a very good idea conceptually. Unfortunately, organisations can’t confidently say their controls are really deployed everywhere they’re expected.
When software reaches EOL, it means that program will no longer be supported by the developer and there will be no more updates. Without updates and bug fixes, this software becomes vulnerable to hackers and cyber criminals.
Stagehand: S1 Episode 5
Keith and I left the scene like we found it: the two kidnappers dead on the floor, their shotgun up against the wall, and the rope used to tie up Carl Timmons sprawled out on the floor. We tipped off local law enforcement and were gone before they arrived, leaving no trace we were ever there.
Stagehand: S1 Episode 4
Keith and I left the scene like we found it: the two kidnappers dead on the floor, their shotgun up against the wall, and the...
SecOps Needs More Democratization, Not Less SOC
An increasing complexity of technologies, as well as an increasing number of failures and attacks followed by an increasing...
Measuring a Cyber Awareness Culture
Until recently, cyber awareness metrics have been treated by many as a tick-box exercise driven by regulations. The regulator...
Good Enough Isn’t Good Enough Anymore
The cyber risks we face today are more than we faced previously but also fundamentally different in several respects. Our...
Data Classification: Building, and Pitching, a Rock Solid Program
In our final installment, we are going to discuss how you roll all the concepts previously covered into a plan of action. The...
Stagehand: S1 Episode 3
Cyprus ~ 2006 Ali Hassan was a low-level operative in Hezbollah, but we had it on solid authority that he knew where three...
Data Classification – How to Categorize It, Where to Store It
Previously, we discussed the requirements of a mature data classification program. In this post, we are going to review the...
Five Best Practices to do Supply Chain Security Right
Supply chain attacks aren’t new. In fact, The National Institute of Standards and Technology (NIST) published their initial...
Stagehand: S1 Episode 2
Carl Timmons: CISO of Illuminating Solutions, a data analytics firm, forty-seven years old, never been married. Last Thursday,...
The Dark at the Top of the Stairs
Let’s say you need to apply a critical patch across the organization, and the patch requires a reboot. While forcing a reboot to...
The Risk of Banking
I just came off a big Zoom call with traditional bankers where they discussed changes in client behaviors, and the impact which...
Effective Board Communication for CISOs
Know Your Board If you’re a CISO, your Board generally knows who you are and what you do. But do you know who they are? No Board...
Data Classification – What It Is, Types & Best Practices
Data classification can help secure your data for compliance and company policy. But where should you even begin in the...
Cyber Ops Must Evolve Towards Fusion Centres. Here is Why.
Since the advent of space exploration in the 1960s, every child understands that the success of the space mission is dependent...
End of Life Software: Risks, Dangers & What to Do Next
Understanding what to do when you have EOL software becomes crucial to the security of your organization. So, what happens when...
Stagehand: S1 Origins
I’m sitting at a table in one of the offices of my private security firm in a tense, but now familiar, setting. No matter who...