From the back room to the boardroom – making IT security a business partner

In my previous post in this series, we discussed the more persistent type of defending we need to do. This ‘persistent defense’ model yields more valuable intelligence and a deeper level of understanding of the attackers.  It can help take the guess work out of attribution and attacker objectives.  But the ultimate question is: how can you use this intelligence to influence business decisions?

Read More

How do the big guys do cyber security?

It may seem hard to remember, but several years ago  data breaches were not regularly in the news. There were only a few breaches, mostly at defense contractors, in the news back then. These companies were some of the few that had to take the threats very seriously at the time. These were the organizations that created processes and technology that allowed them to successfully defend themselves. Out of the fires of their experiences, today’s companies can learn a lot.

Read More