Open in app

Sign In

Write

Sign In

Vicente Aceituno Canal
Vicente Aceituno Canal

956 Followers

Home

About

Published in The CISO Den

·Pinned

Questions a CISO should be able to answer

…or, ask himself/herself at the very least — “Wise is not the one who knows all the answers but the one who knows what questions to ask” More than an article, this is a conversation starter for the CISO and his/her team: What are your answers for this list of essential question that any information security department must…

Cybersecurity

3 min read

Questions a CISO should be able to answer
Questions a CISO should be able to answer
Cybersecurity

3 min read


Published in The CISO Den

·Pinned

Cybersecurity career mistakes

Being there, done that — I have personally made many mistakes during my career. Does that qualify me to give advice? I am not sure. Nevertheless, as a cautionary tale, I can list some mistakes that you potentially want to avoid if you can recognize them. Mistake 1: Going against the flow If you can identify themes and ride them, it…

Cybersecurity

3 min read

Cybersecurity career mistakes
Cybersecurity career mistakes
Cybersecurity

3 min read


Published in The CISO Den

·Pinned

Signs you are a fake Cybersecurity Expert

If you meet more than two of these :) — You throw around the names of famous actual experts often For example, mention how you met Troy Hunt, Bruce Schneier, Brian Krebs, Dan Kaminsky, etc. Also claim that their long exchanges online with anonymous commenters are, for real, yours Bonus: Mention someone who is not as well known like Ross Mayfield to make your audience feel that you know more…

Cybersecurity

3 min read

Signs you are a fake Cybersecurity Expert
Signs you are a fake Cybersecurity Expert
Cybersecurity

3 min read


Published in The CISO Den

·11 hours ago

Fixing Vulnerabilities can be messy;

and so it is — Fixing vulnerabilities is far from straightforward. Of all those that you Receive news of, not all have a patch, and therefore need to be Queued. Others are Not Applicable to our environment, and can therefore be Closed. Of all those that are Assigned to owners to be fixed, not all…

Cybersecurity

1 min read

Fixing Vulnerabilities can be messy;
Fixing Vulnerabilities can be messy;
Cybersecurity

1 min read


Published in The CISO Den

·Mar 22

Ask Smart Questions to Set Security Service Levels

Service Levels are the best way to align Security with the Business — (Originally written as part of the selection process for a well known research and consulting company; as a result, I was found undeserving….) WHY READ THIS ARTICLE Agreeing service levels for information security is currently an uncommon approach, as methods for measuring security requirements in an objective and repeatable manner remain elusive. …

Cybersecurity

8 min read

Ask Smart Questions to Set Security Service Levels
Ask Smart Questions to Set Security Service Levels
Cybersecurity

8 min read


Mar 10

Safe Login Requirements

at a glance —

Cybersecurity

1 min read

Safe Login Requirements
Safe Login Requirements
Cybersecurity

1 min read


Published in The CISO Den

·Mar 6

What you missed in The CISO DEN

Or not — If you read The CISO Den there are some articles that you may have missed while being relevant to you. This is a brief guide of the most useful ones Samples of how to do something Presenting Information Security to the Board Like a promedium.com Cybersecurity Software Development Principles OWASP does not list security features yetinfosecwriteups.com Principles of Evidence-Based Cybersecurity Management Evidence-based cybersecurity management is an alternative to tradition-based cybersecuritymedium.com

Cybersecurity

2 min read

What you missed in The CISO DEN
What you missed in The CISO DEN
Cybersecurity

2 min read


Published in The CISO Den

·Feb 28

Security Awareness in the Valley of Peace

It contains what it says in the can — Probably the best way to improve the security of any organization is by training their employees. Unfortunately this is easier said than done, as users don’t have any interest in cybersecurity. They are right not to be, as most of the time it is not part of their job description. …

Cybersecurity

2 min read

Security Awareness in the Valley of Peace
Security Awareness in the Valley of Peace
Cybersecurity

2 min read


Published in The CISO Den

·Feb 22

How the Federated Identity Oligopoly feeds Big Tech

Google, Facebook, Microsoft and Apple — Most companies that offer products or services or internet have the following questions about their clients: How can I identify my clients? Are my clients who they say they are? How can I understand and record my clients behaviour? Can I trust my clients? Can I make money from understanding…

Cybersecurity

3 min read

How the Federated Identity Oligopoly feeds Big Tech
How the Federated Identity Oligopoly feeds Big Tech
Cybersecurity

3 min read


Published in The CISO Den

·Feb 17

How to ameliorate your Cyber Auditor Phobia

A common ailment among cybersecurity professionals — Cyber Auditor Phobia is an anxiety disorder also known as Auditorphobia (and the closely related Auditphobia), is defined by a persistent and excessive fear of auditor and/or audits. It is an ailment that afflicts some cybersecurity professionals who need to demonstrate compliance with standards or regulations. Auditorphobia typically result in…

Cybersecurity

3 min read

How to ameliorate your Cyber Auditor Phobia
How to ameliorate your Cyber Auditor Phobia
Cybersecurity

3 min read

Vicente Aceituno Canal

Vicente Aceituno Canal

956 Followers

Evidence-based cybersecurity management leader

Following
  • Sam Westreich, PhD

    Sam Westreich, PhD

  • Nadin Brzezinski

    Nadin Brzezinski

  • Diana Meresc

    Diana Meresc

  • Teri Radichel

    Teri Radichel

  • Nitin Sharma

    Nitin Sharma

See all (88)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech