Chronicles of a CISO

Chronicles of a CISO The world through a CISO’s eyes

  • Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends
    by JM on September 13, 2024 at 8:07 pm

    Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends The post Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends appeared first on Chronicles of a CISO.

  • Inherent Risk vs. Residual Risk: The Foundation of Effective TPRM
    by JM on August 21, 2024 at 5:12 pm

    Inherent Risk vs. Residual Risk: The Foundation of Effective TPRM The post Inherent Risk vs. Residual Risk: The Foundation of Effective TPRM appeared first on Chronicles of a CISO.

  • Updated NIST Cybersecurity Framework (CSF) Tool Released
    by JM on March 4, 2024 at 10:29 pm

    The NIST CSF toolkit has been updated to reflect the new Cybersecurity Framework v2.0. The post Updated NIST Cybersecurity Framework (CSF) Tool Released appeared first on Chronicles of a CISO.

  • The Action That Shook An Industry
    by JM on July 10, 2023 at 6:14 pm

    The SEC has put the executives of SolarWinds, including the CFO and CISO on notice. How will this impact the future of the security industry? The post The Action That Shook An Industry appeared first on Chronicles of a CISO.

  • Technology Risk in the Private Equity World
    by JM on February 22, 2023 at 4:12 pm

    New regulations and business drivers are forcing Private Equity firms to take a closer look at cybersecurity risk pre & post-acquisition. The post Technology Risk in the Private Equity World appeared first on Chronicles of a CISO.

  • A CISOs Guide to ESG
    by JM on February 1, 2023 at 3:14 pm

    The term ESG has become a common parlance in the corporate world. How can a CISO leverage ESG to further their program and be better corporate citizens? The post A CISOs Guide to ESG appeared first on Chronicles of a CISO.

  • Cyber Resources For Veterans
    by JM on November 27, 2022 at 5:04 pm

    Career and education resources for those on active duty or veterans who are looking to move into cybersecurity or S.T.E.M. careers. The post Cyber Resources For Veterans appeared first on Chronicles of a CISO.

  • The Evolving Game Of Cyber Insurance
    by JM on October 18, 2022 at 10:04 am

    Cyber insurance is increasingly difficult to obtain and more expensive than ever. A recent study identified the top 10 controls insurance carriers look for when determining coverage and cost. By leveraging specific areas of the NIST CSF, you can qualify for better coverage and effectively lower premiums. The post The Evolving Game Of Cyber Insurance appeared first on Chronicles of a CISO.

  • The Interrupt-driven Life of a CISO
    by JM on June 16, 2022 at 3:40 pm

    The interrupt-driven life of a CISO and how stress impacts our thought process and the changes we make to how our minds work. The post The Interrupt-driven Life of a CISO appeared first on Chronicles of a CISO.

  • Simplify Your Value Statement
    by JM on June 1, 2022 at 7:23 pm

    In order to communicate their message quickly, Vendors need to develop a value statement that appeals to a CISO by quickly articulating how your solution reduces risk, minimizes staffing issues, or enhances budget. The post Simplify Your Value Statement appeared first on Chronicles of a CISO.

  • New Version of the NIST CSF Tool
    by JM on February 18, 2022 at 9:52 pm

    Please note: Version 2.1 of the tool was uploaded to the site on February 28, 2022, due to a formula bug in the privacy worksheet. I am quite thrilled to announce that the long-overdue update to my NIST CSF tool V2.0 is finally done. While this new version generally looks the same as the prior The post New Version of the NIST CSF Tool appeared first on Chronicles of a CISO.

  • The Problem With The Industry Analyst
    by JM on February 8, 2022 at 9:58 pm

    Thoughts on the damage caused by Research Firms to the Information Security field and why the role of the Industry Analyst must change. The post The Problem With The Industry Analyst appeared first on Chronicles of a CISO.

  • Millicom Builds Transformational Identity Security Program
    by JM on August 3, 2021 at 1:43 pm

    The perimeter is dissolving. Employees are using any device from any location for work. With limited visibility from our traditional networking and endpoint security controls, how do we protect our data? The post Millicom Builds Transformational Identity Security Program appeared first on Chronicles of a CISO.

  • Identity Management as a Foundation for Future-Proofing your Security
    by JM on May 21, 2021 at 1:14 pm

    The perimeter is dissolving. Employees are using any device from any location for work. With limited visibility from our traditional networking and endpoint security controls, how do we protect our data? The post Identity Management as a Foundation for Future-Proofing your Security appeared first on Chronicles of a CISO.

  • What if Identity Didn’t Exist?
    by JM on January 26, 2021 at 1:07 pm

    The concept of Identity is critical to what we do. If it didn’t exist, how would it change your approach and how would you answer the question? The post What if Identity Didn’t Exist? appeared first on Chronicles of a CISO.

Share Websitecyber