10 Steps Towards an Information Security Program for Newly Established Companies

It’s not a matter of if your company will be breached but when and for newly established companies or startups the when may be sooner rather than later. Startups are being established across industries and come in many different sizes.  Regardless of whether they are in year 2 or year 5 of their existence, in…

Details

If Not Now, When? If Not Us, Who? – “Tackling The Great Minority Cyber Divide”

In a November 2014 article, Lowell McAdam the CEO of Verizon made the following very bold public statement, “It’s Wrong That in a Room of 25 Engineers, Only 3 Are Women.” Lowell’s very intriguing article went on to quote several other very compelling facts and figures triggering resonance at so many levels, including the prediction…

Details

The Importance of Privacy

Security and Privacy are essential in today’s digital economy.  2014 was a year of large-scale security and privacy breaches, leaving everyone asking themselves how much should we trust companies with our sensitive information.  Currently, there are more than 80 countries with privacy laws.  Violating these laws may result in fines, brand damage, and/or loss of…

Details

GRC Debunker

(UPDATED) CISO’s and their teams are not just producers of risk analyses and assessments.  We are also consumers of them.  They come from many sources.  The main four are: Responses from third parties whose goods and services we are evaluating as part of our due diligence Assessments provided by entities that are targets of mergers, acquisitions,…

Details

Take the Test: Today Ebola, Tomorrow Who Knows? Can Your Business Survive a Pandemic?

Pandemics are epidemics occurring on a scale that crosses international boundaries, usually affecting a large number of people. We may have had near misses, Ebola most recently but the threat of a pandemic is always with us. What is the possible impact to your business and how should you prepare? According to one State Public Health Organization addressing…

Details

For Whom the Bell Curve Tolls

People prefer to choose the groups they are in.  Even before social media exploited that, there were fan clubs, fraternities, sororities, and many different kinds of groups that people associated themselves with. There are also the groups that people don’t choose but through birth, prejudice, unforeseen circumstances and/or unwanted diagnoses, they find themselves in nonetheless. …

Details

From the War Room to the Boardroom – The True Elevation of the CISO

In the aftermath of the Target breach, there has been a lot of press on the need for a Chief Information Security Officer (CISO) in the boardroom.  The Wall Street Journal, the NY Times, Forbes, and a host of other business publications are calling for a senior information risk executive to have the proverbial ‘seat…

Details

Walking the Security Tightrope

Some 38 years ago, I started working for the systems group at CUCCA (Columbia Center for Computing Activities).  I was fresh out of engineering school (Columbia, by coincidence) and a brand new junior systems programmer. In those days, we actually wrote modifications to the operating system in assembly language – it was a lot of…

Details