Announcing the next IBM Security as a Service Roadshow for Business Partners – Cambridge 09/06/2018


Hi everyone,

I hope your summer is going well.  Since Labor Day is the unofficial end of summer, we’ve scheduled our next stop on the Security as a Service Roadshow in Cambridge for Thursday September 6th.  Hopefully most people will be done with vacations, etc. and we will get a good turnout.

The registration site is open as of today.  Please invite your business partners or customers, thanks!

Registration link:

https://ibm.biz/BdYZAj

A CISO’s Guide to Obtaining Budget: Exploit Pet Projects


exploit_pet_projects-460x200

This final episode of the “CISO’s Guide to Obtaining Budget” podcast series focuses on how CISOs can add security components to CAPEX projects, effectively positioning themselves “upstream” of security needs. Understanding where and when to insert security initiatives into larger projects is a common denominator of success for many security leaders.

via A CISO’s Guide to Obtaining Budget: Exploit Pet Projects

A CISO’s Guide to Obtaining Budget: Never Waste a Good Crisis (or Data Breach)


ThinkstockPhotos-684129732-460x200.jpeg

Unlike most resource allocation decisions within the enterprise, decisions involving security projects are often influenced by external events, namely data breaches encountered by other organizations in one’s own sector or industry.

via A CISO’s Guide to Obtaining Budget: Never Waste a Good Crisis (or Data Breach)

A CISO’s Guide to Obtaining Budget: Consciously Cultivate Credibility


ThinkstockPhotos-522139056-460x200

This episode of the “CISO’s Guide to Obtaining Budget” podcast series details how a CISO should build his or her reputation over time and absent of any major demands. Key recommendations include setting up a regular cadence of meetings with relevant executives to discuss business issues and managing security training exercises to demonstrate your expertise and understanding of business risks.

via A CISO’s Guide to Obtaining Budget: Consciously Cultivate Credibility

A CISO’s Guide to Obtaining Budget: Know Yourself


ThinkstockPhotos-616234458-460x200

The typical CISO likely differs in significant ways from other business executives, perhaps in education, experience and also primary job responsibilities. So how do security leaders learn to speak the same language as their C-suite colleagues?

via A CISO’s Guide to Obtaining Budget: Know Yourself

A CISO’s Guide to Obtaining Budget: Know Your Audience


ThinkstockPhotos-159289017-460x200

This episode of the “CISO’s Guide to Obtaining Budget” podcast series offers advice for CISOs and security leaders looking to bridge the gap and communicate more effectively and meaningfully with other executives. Listen now to learn how successful security leaders translate abstract technical issues into straightforward risks that any executive can understand and take action on.

via A CISO’s Guide to Obtaining Budget: Know Your Audience

A CISO’s Guide to Obtaining Budget: The Nature of the Problem


2017-12-27_14-04-21

This first episode of the “CISO’s Guide to Obtaining Budget” podcast series focuses on how organizations make decisions involving cybersecurity spending in a world where resource constraints are a near constant.

Continue reading “A CISO’s Guide to Obtaining Budget: The Nature of the Problem”

New Year, New Threats: Five Security Predictions That Will Take Hold in 2018


5 Security Predictions

On Dec. 31, we’ll close the books on a year that will go down in history — not due to world events, scientific discoveries or pop culture happenings, but because of the record numbers of personally identifiable information (PII) exposed through major data breaches and cybersecurity events that happened throughout the year.

via New Year, New Threats: Five Security Predictions That Will Take Hold in 2018

Most Organizations ‘Don’t Know What They Do Know’ When Assessing Application Security Risk


Ponemon Institute Study: Most Organizations ‘Don’t Know What They Do Know’ When Assessing Application Security Risk487552-630x330

It’s becoming virtually impossible to escape mobile apps. As a consumer, every time you go shopping, attend a major event, post content to social media or listen to the radio, you’re encouraged to download new, customized applications from content providers. Similarly, customer demand for new or updated functionality has shortened software release cycles and led to an explosion of software-based games, fitness applications and quickly evolving versions of popular social media content.

via Most Organizations ‘Don’t Know What They Do Know’ When Assessing Application Security Risk

IBM Cognitive Security – Watson for Cyber Security


Watson is here to help you secure your enterprise.

Watson for cyber security can draw security intelligence from millions of security blogs, online forums and white papers — so you can see threats unseen by other systems .

Source: IBM Cognitive Security – Watson for Cyber Security