Previously I wrote about how I had implemented the simple quantitative analysis from Doug Hubbard’s book ‘How to measure anything...
IT Security Central
IT Security Central
Security culture remains an elusive amorphous ‘thing’ that we all aspire to improve but don’t really understand why or how....
This was a busy week but once again the Open Security Summit proved why it is one of my favourite...
I’ve recently been talking with some executives who bemoan the risk management in their organisations. They don’t trust the risks...
I was speaking with a peer recently about the value of bow-tie diagrams and how they allow you to separate...
In these remote-first times I recently took part in a zoom conversation led by Henry Harrison at Garrison on the...
This is the first installment of a three part series.. Over the next three installments, let’s work through the reality...
INFORMATION TECHNOLOGY PEER GROUP MEETING UNIVERSITY WISCONSIN Value of IT: Using Metrics to Build a Narrative of IT’s Impact within the...
UWEBC INFORMATION TECHNOLOGY PEER GROUP MEETING Value of IT: Using Metrics to Build a Narrative of IT’s Impact within the...
Why is Vulnerability Management so difficult for laypeople to understand? Why does it seem impossible for IT teams to gain...