-
Legendary 20 – Part 3
Read more: Legendary 20 – Part 3This is our trilogy moment! Trilogies can sometimes be good, right? For example Lord of the Rings, Back to the Future, and the original Star Wars trilogy. This week we’re continuing our CIS 20 critical control series with the “foundational” subcontrols 9 – 12. If you’re in need of context or missed the first two…
-
The Legendary 20 – Part 2
Read more: The Legendary 20 – Part 2Back at it again with part 2! This week we’re continuing our journey through the CIS 20 Critical Controls and if this security framework is new to you, go check out part 1. Today we’re transitioning from “basic” to “fundamental” controls. Time is fleeting, so let’s not waste it with intro fluff. 😉 Control 5…
-
The Legendary 20 – Part 1
Read more: The Legendary 20 – Part 1This is the beginning of a five-part series all about the CIS 20 critical controls (+ their subcontrols). A few different talking heads in the world of cybersecurity recommend this as one of the foundational frameworks that most companies should follow when aspiring to stand up a security program. Before I introduce this framework we’re…
-
The Diamond Model
Read more: The Diamond ModelThe difference between a clever and not so clever person comes down to one’s ability to think. Thinking is something we all do, but not everyone thinks with structure. Another name for this structured thinking is called a “mental model” and we all use them, but most of us are unconscious of the models we’re…
-
Career Shifts
Read more: Career ShiftsTwo and a half months ago I realized cybersecurity was the industry I wanted to dedicate my career towards, but this realization took many months of research, frustration, reflection, and writing. How I came about this realization is for a different day. Today I want to share with you how I went from deciding on…
Subscribe