El Diario del CISO (The CISO Journal) Edición 18 | Page 4
Influencers
Dragan Stevanovic
IS Consultant at,
The complete article is here
Nehemiah Security
Transforming how organizations secure technology by scientifically
measuring #risk, predicting #cyberattack results and stopping
advanced #securitythreats.
Enterprise Security Architecture - a short overview
The CISO Needs To Be A Business Leader More Than A
Technical Leader
A security architecture is a topic which has been more and more
demanded, although stakeholders in organizations may still have
quite different views on it and also very different expectations from it.
In many cases it is just about solution design that is capable to
resolve some security issue, however it also includes strategic views
and should drive development of future security capabilities so the
organization is capable to deal with recent challenges. As it is
obviously quite complex topic, with many dependencies to internal
existing processes in organizations, it may be worth to write few
observations and clarify further the topic here among security
professionals.. Nehemiah Security partnered with MightyGuides to interview seven
industry experts with the mission of advancing the risk management
conversation among cyber professionals. Each interviewee was
posed the question, “If your friend was put in charge of measuring
cyber risk at their company, what advice would you give them?” .
The complete article is here Horst Simon Risk Culture Builder
It is time to Think Differently about Risk Management
The complete article is here
The Future is here!
Chiheb Chebbi
Works at Not Telling you Hackers
How to Attack and defend SCADA systems
Hi Peerlysters! Supervisory Control and Data Acquisition (SCADA)
systems are playing a huge role in a modern life. This Article will
guide you through many important terminologies used when it
comes to SCADA system. Later we will discover the most dangerous
threats that face those systems in addition to exploring some
publicly available tools and resources to attack them. Finally, we will
learn how to test a SCADA system using the SCADA Intrusion
Detection System Test Framework.
If you are still trying to Identify all the risks you are exposed to
within the context of your business or spend endless hours
converting historic data into useless risk reports in an effort to
mitigate as much risk as possible for a green light on the road to
taking less risk (for less reward); spending a fortune on controls and
the digging of trenches for your lines of “defense”…. Fear no more!.
The complete article is here
Gary Manley, MA, PMP
How do you measure success in Cybersecurity?