Category: Risk
-
Embracing DevSecOps: Transforming Enterprise Security Programs
In the fast-paced digital landscape, enterprises are under constant pressure to innovate rapidly while maintaining robust security measures. Traditional development and security practices often create bottlenecks, hindering both innovation and protection. Enter DevSecOps—a transformative approach that integrates security into every phase of the development lifecycle. As enterprises aim to streamline processes, enhance security, and accelerate…
-
Shielding Your Crown Jewels 3/3: Overcoming Common pitfalls in Protecting Critical Assets
We started this series of 3 articles by looking at Shielding Your Crown Jewels 1/3: A Cybersecurity Framework for Protecting Critical Assets We moved on to the second article that looked at Shielding Your Crown Jewels 2/3: Common pitfalls Protecting Critical Assets. Now we are look at Article 3/3 on how to overcome the common…
-
Shielding Your Crown Jewels 2/3: Common Pitfalls in Protecting Critical Assets
In a previous article we looked at Shielding Your Crown Jewels: A Cybersecurity Framework for Protecting Critical Assets, where we prescribed a 5 step cycle for ensuring protection of critical business assets. Based on experience supporting organizations in protecting critical assets I have seen common pitfalls faced by many organizations during the implementation of a…
-
Shielding Your Crown Jewels 1/3: A Cybersecurity Framework for Protecting Critical Assets
In today’s digital age, protecting critical assets is essential for individuals and organizations alike. While most large companies recognize the severity of cyber threats, they often treat them as technical issues rather than business problems, leading to a lack of focus on the needs of the enterprise as a whole. Different sectors of the economy…
-
7 Rules of Power – Jeffrey Pfeiffer
If you want power to be used for good, more good people need to have power” – Jeffrey Pfeiffer