Social Network For Security Executives: Network, Learn & Collaborate
Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you are…
Let’s count them down.
No need for security, just get insurance. Transferring risk is better than mitigating it!
Famous Last Words: Sure, it should be covered
Conducing a comprehensive security audit. ...and ignoring the results
Famous Last Words: We will close those gaps later...
Deploying several good tools, set to autopilot. No need to manage or maintain anything
Famous Last Words: Security is not that difficult...
Meeting the minimum requirements (defined 2 years ago)
Famous Last Words: Relax, we are compliant!
We just need one good tool (ex. AV) and we are set.
Famous Last Words: That should do it.
Cybersecurity is a tech problem, its IT’s responsibility.
Famous Last Words: The IT dept has it covered.
Believing the snake-oil (deceptive marketing) salesperson that will 'solve' your security problems
Famous Last Words: We are totally protected now! (or similar derivative from the sales brochure)
Products and services come with security built in!
Famous Last Words: It’s new, shiny, and looks secure. Don’t worry, we should be fine!
Nobody knows or cares about us. We are too small to be targeted.
Famous Last Words: We haven't been attacked yet...
I hope we don’t get attacked. Let’s move on with more important things.
Famous Last Words: <meek inner voice>> Just don’t think about security because it is too scary, expensive, and complex!
This is the menu that evokes anger, frustration, and pity among cybersecurity professionals around the globe. Eventually it always ends in despair, blame, and a side of tears.
A solid long-term strategic plan is a necessity for an efficient and capable cybersecurity capability. Cybersecurity fails without a proper strategy.
Interested in more? Follow me on LinkedIn, Medium, and Twitter (@Matt_Rosenquist) to hear insights, rants, and what is going on in cybersecurity.
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 0 Likes
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
Started by CISO Platform. Last reply by Bhushan Deo Mar 20, 2020. 12 Replies 0 Likes
(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue
Tags: #COVID19
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service
You need to be a member of CISO Platform to join the discussion!
Join CISO Platform