• Legendary 20 – Part 3

     This is our trilogy moment!  Trilogies can sometimes be good, right? For example Lord of the Rings, Back to the Future, and the original Star Wars trilogy.  This week we’re continuing our CIS 20 critical control series with the “foundational” subcontrols 9 – 12. If you’re in need of context or missed the first two…

    Read more: Legendary 20 – Part 3
  • The Legendary 20 – Part 2

    Back at it again with part 2!  This week we’re continuing our journey through the CIS 20 Critical Controls and if this security framework is new to you, go check out part 1.   Today we’re transitioning from “basic” to “fundamental” controls.  Time is fleeting, so let’s not waste it with intro fluff. 😉 Control 5…

    Read more: The Legendary 20 – Part 2
  • The Legendary 20 – Part 1

    This is the beginning of a five-part series all about the CIS 20 critical controls (+ their subcontrols). A few different talking heads in the world of cybersecurity recommend this as one of the foundational frameworks that most companies should follow when aspiring to stand up a security program.  Before I introduce this framework we’re…

    Read more: The Legendary 20 – Part 1
  • The Diamond Model

    The difference between a clever and not so clever person comes down to one’s ability to think. Thinking is something we all do, but not everyone thinks with structure. Another name for this structured thinking is called a “mental model” and we all use them, but most of us are unconscious of the models we’re…

    Read more: The Diamond Model
  • Career Shifts

    Two and a half months ago I realized cybersecurity was the industry I wanted to dedicate my career towards, but this realization took many months of research, frustration, reflection, and writing.  How I came about this realization is for a different day. Today I want to share with you how I went from deciding on…

    Read more: Career Shifts

Subscribe