Articles on Risk Management
Below are my perspectives on risk management, drawn from my work as a security leader and practitioner.
- Risk Management Understand the Reality of the SOC 2 Checkbox SOC 2 standardized security reporting, but it left the vendor in control of the system boundary and auditor selection. Understanding that structural gap helps vendors and buyers get the most value...
- Leadership From Chief Opinion Officer to Action-Taker Security leaders who only assess risks and express concerns operate as Chief Opinion Officers rather than change agents. Delivering outcomes requires agreeing with colleagues on what's real, deciding...
- Leadership What Being a CISO Taught Me About Security Leadership A four-point framework to succeeding as a CISO, based on my experiences of building and leading a security program at a high-growth company. It shows how to focus on the defender's advantage and...
- Leadership The Chief Insecurity Officer What if the CISO's job isn't to maximize security but to calibrate the right amount of insecurity? Reframing the role this way turns security leaders from obstacles into enablers of business velocity.
- Leadership Escaping the Vulnerability Management Hamster Wheel Most vulnerability programs are stuck in a loop of scanning, reporting, and patching that offers a false sense of accomplishment. Escaping this cycle requires shrinking the attack surface,...
- Privacy How Security and Privacy Teams Break Barriers Together Cybersecurity and data privacy leaders share fundamental goals despite having distinct expertise and priorities. A practical framework for aligning security and privacy efforts involves identifying...