As part of my new role, one of my first tasks has been to develop a cybersecurity strategy for the...
IT Security Central
IT Security Central
Probability times Impact Graphs (PIGs), sometimes called a risk matrix, are endemic in security risk assessment and management. They were...
Previously I wrote about how I had implemented the simple quantitative analysis from Doug Hubbard’s book ‘How to measure anything...
Security culture remains an elusive amorphous ‘thing’ that we all aspire to improve but don’t really understand why or how....
This was a busy week but once again the Open Security Summit proved why it is one of my favourite...
I’ve recently been talking with some executives who bemoan the risk management in their organisations. They don’t trust the risks...
I was speaking with a peer recently about the value of bow-tie diagrams and how they allow you to separate...
In these remote-first times I recently took part in a zoom conversation led by Henry Harrison at Garrison on the...
This is the first installment of a three part series.. Over the next three installments, let’s work through the reality...
UWEBC INFORMATION TECHNOLOGY PEER GROUP MEETING Value of IT: Using Metrics to Build a Narrative of IT’s Impact within the...