PinnedPublished inThe CISO DenQuestions a CISO should be able to answer…or, ask himself/herself at the very leastMay 31, 2022A response icon3May 31, 2022A response icon3
PinnedPublished inThe CISO DenCybersecurity career mistakesBeing there, done thatAug 28, 2023A response icon5Aug 28, 2023A response icon5
PinnedPublished inThe CISO DenSigns you are a fake Cybersecurity ExpertIf you meet more than two of these :)Jun 13, 2023A response icon21Jun 13, 2023A response icon21
Published inThe CISO DenBlast from the Past: Trust in Data AttackedThe WannaCry attack was not the largest infection in history. Conficker, Slammer, ILoveYou, NotPetya, among others infected more computers…Apr 17Apr 17
Published inThe CISO DenCISO, how do you measure maturity?No, is not how you thoughtAug 2, 2024Aug 2, 2024
Published inThe CISO DenA Journey to the Highest Cybersecurity Maturity: Resources, Part 11Resources ManagementAug 2, 2024Aug 2, 2024
Published inThe CISO DenA Journey to the Highest Cybersecurity Maturity: Quality, Part 10Quality ManagementJul 30, 2024Jul 30, 2024
Published inThe CISO DenA Journey to the Highest Cybersecurity Maturity: Performance, Part 9Activity ManagementJul 18, 2024Jul 18, 2024
Published inThe CISO DenA Journey to the Highest Cybersecurity Maturity: Knowledge, Part 7Knowledge ManagementJul 10, 2024Jul 10, 2024