Open in app
Home
Notifications
Lists
Stories

Write
Vicente Aceituno Canal
Vicente Aceituno Canal

Home
About

Published in The CISO Den

·Pinned

Guide for Readers of The CISO Den

Don’t let the trees prevent you from seeing the forest — Now that there are more than 600 readers of “The CISO Den” and more than 70 articles, I think it will be handy to have a guide of what has been published so far to help you find content that you are interested in, and that may have been published…

Cybersecurity

5 min read

Guide for Readers of The CISO Den
Guide for Readers of The CISO Den

Published in The CISO Den

·Pinned

Must read books for cybersecurity professionals

While not being books about cybersecurity — The following books are not just a nice read, they give essential insights about topics that touch core issues of cybersecurity, while not being books about cybersecurity. These books changed my perspective and shaped quite a bit of my ability to analyze and provide cybersecurity solutions in environments where there…

Cybersecurity

3 min read

Must read books for cybersecurity professionals
Must read books for cybersecurity professionals

Published in The CISO Den

·Jun 29

A CISO tale: The road to mastering Infosec-fu

Once upon a time… — THIS IS A CHOOSE-YOUR-OWN-STORY, YOU CAN CHOOSE THE ENDING! Once upon a time there was an information technology student named Ziso. Ziso’s parents sent her to school in the hopes she would become an Product Manager like his grandfather. …

Cybersecurity

8 min read

A CISO tale: The road to mastering Infosec-fu
A CISO tale: The road to mastering Infosec-fu

Published in The CISO Den

·Jun 23

So, what is a cybersecurity incident?

Is there a definition everyone can agree on? — So, the antivirus detects a virus in the computer of the training room as someone mistakenly downloads something during training. Is this a security incident? Some professionals will say yes, some will say no, some will say it depends. Some will say it is an incident if it is a…

Cybersecurity

4 min read

So, what is a cybersecurity incident?
So, what is a cybersecurity incident?

Published in The CISO Den

·Jun 21

Documents in cybersecurity are unfairly unloved

In defense of documents — Most people who are in cybersecurity love love love technology. A command line, a PoC, a challenge, some source code to decypher, that is what lights up most eyes. But besides the excitement of the hunt when chasing a cybercriminal, and the many hours of research that can take to…

Cybersecurity

2 min read

Documents in cybersecurity are unfairly unloved
Documents in cybersecurity are unfairly unloved

Jun 20

The Euler Identity gets a new old friend

The most famous equation in mathematics — The Euler identity is well known among math buffs as the best example of mathematical beauty, connecting in a brief equation several fundamental numbers, among them (list from Wikipedia): The number 0, the additive identity. The number 1, the multiplicative identity. The number π (π = 3.1415…), …

Mathematics

2 min read

The Euler Identity gets a new old friend
The Euler Identity gets a new old friend

Published in The CISO Den

·Jun 17

CISO, how good are your Cybersecurity Reports?

You know what I mean? — Reports and Dashboards are very valuable tools for CISOs and cybersecurity managers, but are notoriously difficult to get right. It is easy to fall for the Numbers Buffet Dashboard anti-pattern, for example. Ideally a report should have a graphical representation of metrics that are a reflection of the results of…

Cybersecurity

2 min read

CISO, how good are your Cybersecurity Reports?
CISO, how good are your Cybersecurity Reports?

Published in The CISO Den

·Jun 7

Great Cybersecurity professionals are always right. Right?

If you were ever wrong, how would you know? — When you are competent you can eventually fall into the trap to believe that you are always right. This is why I believe is important to use methods that have self-correcting characteristics, in other words, if you are wrong, and you WILL be wrong, you will find out. Probably one…

Cybersecurity

3 min read

Great Cybersecurity professionals are always right. Right?
Great Cybersecurity professionals are always right. Right?

Published in The CISO Den

·Jun 1

Evidence Based Cybersecurity Management Course and News

For advanced cybersecurity managers — I have some news. Well, it seems I have been shortlisted for the European Cybersecurity Blogger Awards! If you like my blog, it would be nice if you vote for me. Also, I will be running a new session of my Evidence-Based Information Security Management Course during the last week…

Cybersecurity

2 min read

Evidence Based Cybersecurity Management Course and News
Evidence Based Cybersecurity Management Course and News

Published in The CISO Den

·May 31

Questions a CISO should be able to answer

…or, ask himself/herself at the very least — “Wise is not the one who knows all the answers but the one who knows what questions to ask” More than an article, this is a conversation starter for the CISO and his/her team: What are your answers for this list of essential question that any information security department must…

Cybersecurity

2 min read

Questions a CISO should be able to answer
Questions a CISO should be able to answer
Vicente Aceituno Canal

Vicente Aceituno Canal

Evidence-based cybersecurity management leader

Following
  • Prof Bill Buchanan OBE

    Prof Bill Buchanan OBE

  • Diana Meresc

    Diana Meresc

  • Richard de Vries

    Richard de Vries

  • Clive Thompson

    Clive Thompson

  • Teri Radichel

    Teri Radichel

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable