Don’t look for talent. Create it instead.

Some people establish organizations because they want to build something big, or want recognition. But in 2013 when I established the Philippine Institute of Cybersecurity Professionals, I was coming from a different place: Disappointment and anger. At that time I had just come back home from a security consulting stint in Spain. When I got…

Details

OD in cybersecurity

CISO, Delta Dental Plans Association Cybersecurity is so much about users and the vigilance of people in the organization. Understanding the underlying psychology of the organization, its culture and mindset, gives me an amazing insight that is priceless in developing cybersecurity strategies. The most useful concepts that help me at my job as CISO of…

Details

A Modest Proposal to Eliminate (or Modify) Breach Disclosure Laws

by Mark Rasch Google recently disclosed the fact that a vulnerability in its Google Plus configuration could have been used by hackers to expose personal information about users of the Google Plus service. (https://www.nytimes.com/2018/10/08/technology/google-plus-security-disclosure.html) Indeed, Google announced that it was shutting down the service as a result of the hack. That’s not what outraged the…

Details

Darren Death: Developing a business continuity plan – and sticking to it

It is standard business practice for organizations to have a contingency plan after acknowledging the various threats and risks that it faces. Having a plan in place, however, is not enough. The organization must periodically update the plan, test how well it works, communicate it to stakeholders, and ensure that people have the capability to…

Details

How to Get Everyone Attuned to Cybersecurity: Ways to Raise Security Awareness

Your organization’s security stance must be supported by everyone in the company, every day, in all that they do. However, people are focused on their jobs, not necessarily on security. With attacks increasingly starting at the human level through social media or targeted emails, your organization needs to create and maintain a high level of…

Details

People, Process and Technology: Tips for Strengthening the Three Pillars of a Highly Effective Security Program

Did you know you need just three resources to build a highly effective security program? It’s true. Your success will be highly contingent upon how you leverage people, process and technology. Perhaps it is the rule of three which make this all gel, but if you take proper care of these three elements, everything else…

Details

Healthcare Ransomware Attacks – Don’t Be Part of the Statistics

In 2017, six of the top ten HIPAA breaches reported to the U.S. Department of Health and Human Services (HHS) stemmed from ransomware.[1] In a typical ransomware attack, important data is encrypted and “held for ransom” until the victim pays a designated amount in exchange for gaining access to the keys to decrypt the data…

Details