13 Sep 24 Enhancing Infosec with PASTA, NIST CSF, and CMMI Models Joe Sullivan No Comments Learn how to integrate PASTA, NIST CSF, and CMMI models to build a robust and mature information security program. Read More
20 Aug 24 Overlooking the Bigger Picture Joe Sullivan No Comments Lacking a security strategy leads to wasted resources, missed opportunities, and a reactive approach, leaving organizations exposed to threats. Read More
16 Aug 24 Articulating Risk to Executives Joe Sullivan No Comments Learn how to articulate risk to executives, turning abstract concerns into actionable priorities that align with business objectives. Read More
15 Aug 24 Embracing Remote Work in a Travel Trailer Joe Sullivan No Comments Discover how to work remotely from a travel trailer with reliable internet, power management, and a productive workspace. Read More
13 Aug 24 Understanding Common Windows Forensics Artifacts Joe Sullivan No Comments Learn about key Windows forensics artifacts such as event logs, prefetch files, and the Master File Table (MFT) in digital investigations. Read More
09 Aug 24 Adapting Leadership Styles to Different People Joe Sullivan No Comments Explore the importance of adaptive leadership, focusing on understanding and inspiring diverse team members for success. Read More
06 Aug 24 Establishing Risk Appetite Joe Sullivan No Comments A well-defined risk appetite helps align security strategies with business objectives, prioritizing resources and managing risks effectively. Read More
05 Aug 24 Navigating Vendor Hype and Evaluating Solutions Joe Sullivan No Comments Learn how to see through vendor hype and effectively evaluate new cybersecurity solutions at Black Hat and Defcon. Read More
03 Aug 24 The Micromanager’s Meeting: A Tale of Frustration and Strategy Joe Sullivan No Comments Discover strategies for dealing with micromanagement and passive aggression in the workplace by fostering open communication and respect Read More
02 Aug 24 Understanding CISO Reporting Structures and Their Implications Joe Sullivan No Comments Discover how a CISO's reporting structure reflects an organization's commitment to cybersecurity and influences overall security effectiveness. Read More