ciso (157)
“Flickering screens, a sickly, yellow glow. Humming servers, a constant, low thrum of digital malaise. Alerts screamed into the void, a cacophony of meaningless noise, lost in the echoing expanse of our digital tomb. Playbooks, relics of a forgotten
Icarus, in Greek mythology, son of the inventor Daedalus who perished by flying too near the Sun with waxen wings.
BALANCE
Throughout my career, I’ve had the opportunity to help many organizations out with operational, tactical, and strategic s
“COBIT is not about security!”
I have heard this statement being said a couple of times about COBIT and for a bunch of different certificates and certifications throughout my career. There is of course truth in this statement as COBIT is not explic
Businesses of all sizes, whether in the financial, transportation, retail, communications, entertainment, healthcare, or energy sectors, are impacted by cybersecurity. Cyberthreats are commonplace. Cyberattacks have increased in frequency and malicio
PAYMENT PAGE SECURITY; Navigating PCI DSS v4.0: Insights on Requirements 6.4.3 and 11.6.1
Interview with Ed Leavens, Founder and CEO of DataStealth
As the March 31, 2025 deadline for PCI DSS (Payment Card Industry Data Security Standard) v4.0complian
Cybersecurity is on the brink of significant transformation as we approach 2025, grappling with escalating complexities driven by advancements in technology, increasing geopolitical tensions, and the rapid adoption of AI and IoT. In this blog, I’m ex
Welcome to the Challenge: Governance, Risk & Security
A CISO’s world is never just about technology. It’s about governance, risk, and control. Without governance, security becomes a guessing game. Without risk management, threats remain unseen. A 30-
My former “colleagues” have written several serious pieces of research about why a SOC without humans will never happen (“Predict 2025: There Will Never Be an Autonomous SOC”, “The “Autonomous SOC” Is A Pipe Dream”, “Stop Trying To Take Humans
Imagine this. You’re standing in your kitchen, making toast. Suddenly, you hear a dripping sound. You glance at the sink and notice water pooling around the base. It’s not a flood—yet—but it could be. You investigate the source, tighten a loose pipe,
Unfortunately, I am old enough to remember how SIEM was done before the arrival of threat intelligence feeds. We had to write broad behavioral (well, “behavioral-ish”, if I am totally honest) rules without relying on any precise knowledge of attacker
The Cyber Threat Landscape for Small Businesses
Small and medium-sized businesses (SMBs) face a rising tide of cyber threats, challenging the misconception that only large corporations are at risk. As cybercriminals increasingly target smaller organi
Mastering Your First 30 Days as a CISO: A Strategic Roadmap
Stepping into the role of Chief Information Security Officer (CISO) is no small feat. The first 30 days are a critical window where you establish credibility, align with business objectives,
The warrior Achilles is one of the great heroes of Greek mythology. According to legend, Achilles was extraordinarily strong, courageous and loyal, but he had one vulnerability–his “Achilles heel.” Homer’s epic poem the Iliad tells the story of his a
You do not need to have a title or rank to be a leader. You do not need to have a certain number of stripes on your shoulder or badges on your chest to be a leader. You do not need to have loads of different achievements to be a leader. So, what d |
MYTH: A traditional story, especially one concerning the early history of a people or explaining some natural or social phenomenon, and typically involving supernatural beings or events.
Source: dictionary[.]cambridge[.]org
INGRESS
Security favo
lead (v.1)
“to guide,” Old English lædan (transitive) “cause to go with oneself; march at the head of, go before as a guide, accompany and show the way; carry on; sprout forth, bring forth; pass (one’s life),” causative of liðan “to travel,” from Prot
“It is not the strongest of the species that survives, not the most intelligent that survives.
It is the one that is the most adaptable to change.”
Charles Robert Darwin, 1809 – 1882
Change is constant, we may like it or not. But it is the tr
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology Implementation: From…
- Created by: Biswajit Banerjee
- Tags: ciso, playbook, round table
Fireside Chat On The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem
- Description:
We’re excited to bring you an insightful fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operations Specialist, BJC Healthcare) and Erik Laird (Vice President - North America, FireCompass), where we delve deep into the hidden layers of cybercrime, exploring how stolen data is monetized, its impact, and how organizations can fight back.
The cybercrime ecosystem is thriving, with stolen data fueling…
- Created by: Biswajit Banerjee
- Tags: fireside chat, stolen data, matthew maynard, ciso
CISO Cocktail Reception At RSAConference USA, San Francisco 2025 !
- Description:
We are excited to invite you to the CISO Cocktail Reception if you are there at the RSA Conference USA, San Francisco 2025. It will be hosted aboard a private yacht, so that our CISO's can enjoy the beautiful San Francisco skyline while cruising the Bay Area! This event is organized by EC-Council with CISOPlatform and FireCompass as proud community partners.
Yacht Party…
- Created by: Biswajit Banerjee
- Tags: ciso, usa, san francisco, rsaconference 2025
Round Table Dubai 2025 | GISEC
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology…
- Created by: Biswajit Banerjee