Being a Leader People Admire
LinkedIn
March 21, 2024
It's about something other than having the loudest voice or the most authoritative presence.
See publication
Tags: Cybersecurity, Digital Transformation, Security
Your Leadership in 2024: Steering Business and Cybersecurity – 8 things you need to know and review at least monthly.
LinkedIn
January 18, 2024
The traditional, linear approach to leadership is not adequate for leaders anymore. Today's leaders must navigate a landscape where change is the only constant, and old management paradigms have become obsolete.
See publication
Tags: Cybersecurity, Leadership
Leadership this year - Leadership in 2024 – what will you change?
LinkedIn
December 22, 2023
The Prussian military strategist Karl von Clausewitz once said, "Everything in war is easy, but the easy things are difficult." All the theories, five-step workshops, and how-to books on leadership, emotional intelligence, and self-improvement often oversimplify the implementation process, making it appear straightforward. However, leadership is a nuanced blend of art and science.
See publication
Tags: Cybersecurity, Leadership
Leadership Negligence or Responsibility- How can CISO's navigate this?
LinkedIn
December 12, 2023
Leading is like conducting a symphony, where each instrument plays a vital role. It's about orchestrating harmony, even amidst diverse notes.
See publication
Tags: Cybersecurity, Leadership
Prioritizing preparation for incoming attacks –STOP playing defense all the time!
LinkedIn
October 23, 2023
I recently conversed with a prominent CEO whose company had experienced a breach earlier this year. This discussion unfolded over meetings with the Board of Directors and executive leadership sans the Chief Information Security Officer (CISO).
See publication
Tags: Cybersecurity
3 ideas that will guide your leadership success
LinkedIn
October 12, 2023
Last week I was asked to give my opinion on 3 qualities of effective leaders…on the spot…in front of an audience. It was unexpected and I had not thought through an answer.
I’m not one for speaking in generalities or repeating big, well known concepts. I like to be practical and appliable...I stumbled through it, but it got me thinking.
See publication
Tags: Cybersecurity, Leadership
Leadership Metrics: How to Assess Your Impact and Elevate Your Team
LinkedIn
October 05, 2023
In my career (especially recently) I have had to manage through some tremendously bad, narcissistic leaders and staff. I had to make a choice–go along and act the same way. Could have ignored it (same as condoning it), or make some hard decisions…given my values and personality – I made the hard decision.
See publication
Tags: Cybersecurity, Leadership
10 Signs You're in a Toxic Work Environment
LinkedIn
September 15, 2023
A long time ago, I was told that everyone should be treated with Dignity, Respect, and Civility, and that should be the baseline behavior for everyone. So if someone deviates from that, they will stick out like a sore thumb and be unacceptable to everyone.
See publication
Tags: Cybersecurity
Cyber Resilience Strategy–you gotta start somewhere.
LinkedIn
September 12, 2023
In the last article I outlined a foundational approach to Cyber Resilience. In this article I wanted to provide a more strategic approach, by outlining several key steps to consider when you need to build out a plan.
See publication
Tags: Cybersecurity, Business Strategy
Can CISOs give business advice?
Medium
June 30, 2023
A lot has been written over the last few months about if a CISO can be a valuabel member of a Board of Directors.
As a collegue recently wrote "Most of the current commentary about the potential “fit” of CISOs in Board of Directors is written by people who have never held the position of “CISO” in a publicly-traded organization. It is not surprising then, that these people don’t truly understand what a CISO does, or how they do it."
See publication
Tags: Cybersecurity, Risk Management, Business Strategy
How to build a cyber-resilience culture in the enterprise
https://www.techtarget.com/searchsecurity/post/How-to-build-a-cyber-resilience-culture-in-the-enterprise
January 24, 2023
See publication
Tags: Cybersecurity, Leadership, Risk Management
4 Pillars of Cyber Resilience
WWT
October 07, 2021
The proliferation of high-profile, sophisticated ransomware attacks has brought cyber resilience into the spotlight. Board members, regulators and government leaders are asking CISOs to get their organizations “resilient” ASAP. But what does a cyber resilience program actually look like?
To answer this question, it’s important to understand that cyber resilience differs from traditional security disciplines in that it’s not preventative in nature. Instead, cyber resilience assumes a breach will occur. The goal of cyber resilience is to make sure an organization maintains critical business operations when one does.
See publication
Tags: Cybersecurity, Digital Transformation, Risk Management
What Is Cyber Vault and How Does It Relate to Cyber Resilience?
WWT
March 26, 2021
Many global organizations now regard state-sponsored cybersecurity attacks as a major threat. Ransomware attacks have become the most lucrative cyber-crime area -- in 2020 approximately 58% of ransomware victims paid versus 39% in 2017. It's no wonder -- attacks ranging from nuisance malware to more sophisticated attacks can cripple an entire organization.
See publication
Tags: Cybersecurity, Digital Transformation, Security
Strategic Actions You Can Take After SolarWinds
WWT
January 28, 2021
The cybersecurity world saw a dramatic end to 2020 with the disclosure of a large-scale, sophisticated breach orchestrated through the SolarWinds supply chain that affected to more than 18,000 organizations. For the first few weeks following the breach, organizations performed due diligence to identify and mitigate the impact. But what do you do now as we emerge from tactical response to developing a proactive strategy in 2021?
See publication
Tags: Cybersecurity, Digital Transformation, Security
SolarWinds Supply Chain Breach: What You Need to Know
WWT
December 18, 2020
SolarWinds, a popular provider of IT and monitoring solutions, has disclosed a large-scale breach. FireEye has attributed attacks to a sophisticated nation-state actor group. Once SolarWinds was breached, actors modified source code updates to the Orion platform to include malware. To date, compromised update packages include 2019.4 HF5 through 2020.2.1, deployed during March 2020 to June 2020 to clients through supply chain updates to the Orion platform.
See publication
Tags: Cybersecurity, Digital Transformation, Security
Cyber Resilience for Your Business
WWT
October 18, 2020
Cybersecurity and cyber resilience are distinct disciplines. Cybersecurity is comprised of mostly defensive actions and what can be done to keep attackers out. Cyber resilience is designed to minimize the impact of a cyberattack on the organization. You have to start from the perspective that you are attacked.
See publication
Tags: Cybersecurity, Digital Transformation, Security
Losing Our National Security Through 5G Networks
Cypher Brief
October 01, 2020
The advent of 4G technology in 2006 and subsequent Smartphones completely changed the world of communication. Now 5G, which will be able to support billions of newly connected sensors and new classes of devices, stands to make an exponentially larger global impact. With 5G’s expanded accessibility to internet services across all industries, it’s even more imperative to highlight privacy issues, national security and defense risks.
See publication
Tags: GovTech, 5G, National Security
Evolving Cybersecurity Operations Across the Organization
Geoff Hancock
August 12, 2020
Successfully defending the organization requires more than guarding against security threats. As organizational success and technology become more intertwined, a holistic cybersecurity operations program can be the piece of the puzzle that helps CISOs connect organizational goals, technology investments and daily defense.
See publication
Tags: Cybersecurity, Risk Management, Security
Do you really CELEBRATE Memorial Day?
LinkedIn
May 27, 2019
Today there are many articles, Op-Eds, LinkedIn posts, Tweets etc all reminding us of the ultimate sacrifice that was made today.
See publication
Tags: Cybersecurity, Digital Transformation
Make Sure You Are Not Helping The Russians Spy On American Asset
LinkedIn
June 02, 2018
Fancy Bear, the same Russian hacking group responsible for the DNC breach, recently released a well-designed malware capable of not only stealing data, but remotely shutting off Internet services of organizations that use certain internet routers and Internet of Things (IoT) devices. Its purpose is offensive cyber operations against many targets, placing businesses, federal agencies, and the national security infrastructure possibly at risk.
See publication
Tags: Cybersecurity, Security, National Security
Cyber Intelligence Initiative Inaugural Conference: Breakout Session A
YouTube
May 24, 2016
This certification provides a comprehensive, strategic, and practical, in-depth understanding of the growing importance of cyber intelligence capabilities and analysis for U.S. corporations and government agencies. By combining the operational and strategic value of cyber intelligence as applied to both government and corporate users, this certification will help government and industry professionals create clarity around breaches and cyber events, and create deterrence strategies to better protect their organizations in this ever changing cyber battlefield.
See publication
Tags: Cybersecurity, Digital Transformation, Security
Cyber Intelligence: Operationalizing Best Practices
YouTube
October 19, 2015
When an organization incurs a network intrusion, an attempt to degrade its network capabilities, or other cyber incident against its systems and data, cyber intelligence can provide exquisite insight into the tactics, techniques and procedures (TTPs) implemented as well as the motivations and capabilities of the perpetrator. Organizations looking to gain greater insight into the threat environment are now integrating cyber intelligence into their operations, from the strategic-minded executive leadership to the operational managers and the tactical, on-the-network cybersecurity personnel. Panelists will examine the best practices of cyber intelligence, and how organizations from the public, private, nonprofit and academic sectors can benefit.
See publication
Tags: Cybersecurity, Digital Transformation, Security
Understanding Cyber Adversaries
C - Span
February 22, 2013
Senior officials from government agencies discussed efforts to guard against cyber attacks. They said the rapid pace of change in the cyber world often clashed with government’s ability to deploy tools for combating the threats. Jeff Eisensmith, of the Homeland Security Department, said a bigger budget would allow his agency to do a better job of policing the information technology supply chain, which is one of the areas vulnerable to cyber attacks.
See publication
Tags: Cybersecurity, Digital Transformation, Security
Four Pillars of Cyber Resilience
WWT
November 10, 2021
Cyber resilience is one of the biggest trends in cybersecurity. With the proliferation of damaging ransomware attacks and enterprise-wide threats, organizations are increasingly required to have a cyber resilience program. But the best way to build a program remains a topic of confusion. Join host Robb Boyd as he speaks with WWT’s Geoff Hancock, Global Director of Cybersecurity Engineering and Scott Webb, Global Storage Practice Manager, as they dig into the nuances of cyber resilience.
See publication
Tags: Cybersecurity, Digital Transformation, Risk Management
Holistic Approach to Cybersecurity
WWT
February 01, 2021
Business and technology executives are challenged with aligning business goals, increased dependence on technology and the responsibility to secure the organizations most important assets. As any breach report can attest, this is a complicated task that requires a balance of understanding the business risks and goals, managing technology tied into the responsibility to secure the organization and its assets. That is why it is critical that organizations stop being focused on specific solutions and start looking at their organization holistically. How can organizations holistically be secure? In this episode, we will discuss the elements that make up an enterprise wide security program and how this program impact every aspect of the organization. We will also discuss traditional cyber operations and compare it to how some organizations are being more proactive with how they approach holistic cyber security, and we will outline how business executives are managing their cyber risk.
See publication
Tags: Cybersecurity, Digital Transformation, Risk Management