Trust But Verify – Part 2

Trust But Verify – Part 2   What if I told you you could install a new cybersecurity habit this week? What if I told you this habit was borrowed from a prominent political leader? This one is former US President Ronald Reagan. And his statement, trust, but verify. I’m sure you remember him and […]

What are Insider Threats in Cybersecurity?

What are Insider Threats in Cybersecurity?

What are Insider Threats in Cybersecurity? A Cybersecurity Insider Threat occurs when someone with access chooses to or gets tricked into using that access to harm your company. Insider Threats in cybersecurity can be employees, contractors, vendors, or visitors, and their intent can be either intentional or accidental. An example scenario where this might happen […]

Culture

Building a Cybersecurity Culture

Building a Cybersecurity Culture Are you curious about how you can be successful at building a cybersecurity culture? This course will teach you how to leverage organizational change principles to develop, maintain, and measure a security-driven culture. Through hands-on instruction, interactive labs, and exercises, you will apply organizational change concepts to various security initiatives and […]

Make your boss take notice!

Make your boss take notice! Are there ways you can work to make your boss take notice? Definitely! The best career advice I ever received came from a non-tech non-cyber friend many years ago. Little did I know how well her sage advice would serve me over the last 20 years. The lesson was – […]

Resolve to Be More Involved In Your Local Community – REVISITED

It has been five years since I published my first Diary at the SANS Internet Storm Center on the topic of getting more involved in your local community. Now that January is almost over and those new year resolutions you made last month may or may not still be in place, I want to give you […]

CIS Controls Implementation Guide

CIS Controls Implementation Guide The CIS Controls Implementation Guide was recently released by the Center for Internet Security (CIS), the home of CIS Controls directly mapped to their CIS Controls. It is focused on actionable steps that can be taken right now to assess and improve cyber security posture and preparedness, particularly in small and medium-sized […]