Blog (927)

Exploring%20the%20Complementary%20Nature%20of%20External%20Attack%20Surface%20Management%20in%20Cybersecurity.png 

 

 In today's rapidly evolving cybersecurity landscape, the need for comprehensive defense strategies is more critical than ever. External Attack Surface Management (EASM) emerges as a crucial component, offering organizations valuable insights int

Read more…

The%20evolution%20of%20continous%20testing%20in%20cybersecurity%20from%20EASM%20TO%20ASM.png?profile=RESIZE_710x

 

In the ever-changing landscape of cybersecurity, staying ahead of threats requires a proactive approach. Over the years, we've witnessed the rise of Effective Attack Surface Management (EASM) products, offering valuable insights into an organizati

Read more…

Navigating%20Cybersecurity%20Conversations%20Bridging%20Business%20Needs%2c%20Relationship%20Building%2c%20and%20Problem-Solving.png?profile=RESIZE_710x

 

 

In the complex world of cybersecurity, bridging the gap between technical experts and business stakeholders is paramount for effective communication and collaboration. However, business leaders often find themselves lost in a sea of acronyms and

Read more…

Exploring%20Effective%20Multi-Step%20Exercises%20for%20Deep%20Insights.png?profile=RESIZE_710x

 

Embark on a journey of strategic planning and preparedness as we explore the nuances of conducting tabletop exercises effectively. Our narrative unfolds with a discussion on the optimal approach to conducting these exercises, whether as a single c

Read more…

Driving%20Improvement%20Through%20Feedback%20Creating%20Engaging%20Environments%20for%20Tabletop%20Exercises.png?profile=RESIZE_710x

 

 

Embark on a journey of insight and innovation as we explore the dynamics of feedback-driven improvement and the importance of creating engaging environments for tabletop exercises. Our narrative begins with an examination of the 'hot wash' proce

Read more…

Lessons%20in%20Cybersecurity%20Personal%20Introductions%2c%20Unexpected%20Encounters%2c%20and%20Security%20Dilemmas.png?profile=RESIZE_710x

 

Embark on a captivating journey through the complexities of cybersecurity and human behavior, where anecdotes of missed context, unexpected encounters, and security dilemmas converge to unveil invaluable insights. Our narrative begins with a recou

Read more…

Navigating%20Diverse%20Experiences%20From%20Blackouts%20to%20Cybersecurity%20Innovations.png?profile=RESIZE_710x

 

 

Embark on a riveting journey through the dynamic realms of emergency response, cybersecurity innovation, and strategic planning, guided by the insightful reflections of Dan Lurman, former Chief Security Officer for the state of Michigan. Our nar

Read more…

Navigating%20Cybersecurity%20Challenges%20From%20Intense%20Scenarios%20to%20Emergency%20Preparedness.png?profile=RESIZE_710x

 

Embark on a riveting journey through the highs and lows of cybersecurity preparedness, guided by insightful anecdotes and real-life experiences. Our narrative begins with a nod to the iconic film "Live Free or Die Hard," drawing parallels to the i

Read more…

From%20Faith%20to%20Cybersecurity%20A%20Journey%20of%20Diverse%20Interests%20and%20Emerging%20Threats.png?profile=RESIZE_710x

 

 

Embark on a fascinating journey with an individual whose diverse background encompasses a rich tapestry of faith, intellectual curiosity, and a deep-rooted passion for cybersecurity. Raised in a household where the echoes of Lutheran and Presbyt

Read more…

Strategizing%20for%20Business%20Resilience%20Integrating%20Comprehensive%20Scenario%20Planning%20with%20Zero%20Trust.png?profile=RESIZE_710x

 

In the ever-evolving landscape of business and technology, the prospect of industry consolidation looms large, driven by predictions and market trends. As organizations navigate these uncertainties, comprehensive scenario planning emerges as a vit

Read more…

Consolidation%20and%20Zero%20Trust%20The%20Future%20of%20Cybersecurity%20.png?profile=RESIZE_710x

 

In the ever-evolving landscape of cybersecurity, seasoned professionals offer invaluable insights into emerging trends, challenges, and strategies. In this blog post, we engage in a conversation with Dan, an experienced security expert, as he shar

Read more…

Responding%20to%20a%20Cyber%20Crisis%20A%20Lesson%20in%20Preparedness.png?profile=RESIZE_710x

 

Handling crises, whether natural calamities or cyber emergencies, requires preparedness, agility, and resilience. In this blog post, we delve into real-life experiences shared by Dan, a seasoned security professional, highlighting pivotal moments

Read more…
RSS
Email me when there are new items in this category –

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership