Managing Up and Out™
Cybersecurity is Like Securing Your Car
Just like securing your car, it takes more than one thing to be cybersecure. Problems come from more than one angle and each protection has its strengths but also limitations. We add up the strengths and protect the blind spots by layering the protections.
Leverage Cybersecurity Spending
A diamond only shines to the extent that it’s in the right setting. Getting full leverage from your cybersecurity spending works on the same principle. The optimal setting for cyber technology requires adapting processes and fully engaging your people. This is the shortcoming of every silver bullet scenario.
The Cybersecurity Business Case for Manufacturing Supply Chain
As the number one most attacked industry, manufacturing is in the cross-hairs of cybercrime. At the same time manufacturing has less visibility into supply chain tiers than other verticals. This combination of factors amplifies the potential blast radius for damage.
Making the Business Case for Cybersecurity – Cyber Insurance 4Q 2021
Cyber Insurance offers useful insights to quantify cyber risk and make it real for business owners, CxOs and board members of public companies.
Configuration Assurance – Naming the Elephant
This is the story of a dilemma solved. A Chief Information Security Officer (CISO) had time and again discovered problems with patching and configuration settings not matching agreed upon standards.
How to make your data classification project easier
Leverage our lessons learned to make your project easier using the SecuriThink Data Classification Complexity Scale.
The Rapidly Changing Role of the CISO
Actionable distinctions about CISO responsibilities and the skills to master them have been identified by executive recruiters. These distinctions go beyond staffing; they also describe behaviors that increase overall InfoSec maturity.
Data Classification – Example 1
Rally C-suite ownership with a compelling business case for change
Data Classification – Example 2
Managing across the enterprise for new security habits
Data Classification – Example 3
Quick Start the project, cross-train client team, manage risk
Secure the Perimeter
23 Workstreams over 2 years deployed many technologies and policy changes in support of a “Defense In Depth” InfoSec strategy
Administrative Rights
Reduce technical support with appropriate employee engagement
Complex Passwords
Minimize business impact and technical support requirements