fbpx

“Where do we begin?” This is actually the relevant question every CISO asks about every new program. In fact, Per month i ask and answer that question often. There’s reasonable for this, of course. A solid start to any task builds momentum, reassures stakeholders, and sets the phase for what’s ahead. Security resilience initiatives are […]

Read more

Talking with many CISOs, it’s very clear that many safety executives view zero rely on as a journey which can be tough to start, and one which makes identifying successful outcomes challenging even. Simultaneously, the main topics security resilience provides risen up the C-degree agenda and is currently another focus for protection teams. Therefore, are […]

Read more

<h3> <strong> <em> “There’s therefore much left to learn, and I’m on the path to learn.” -Cat Stevens (Yusuf) </em> </strong> </h3> 2 yrs ago, we asked the question: What actually works in cybersecurity? Not really what everyone’s doing-because there are many cybersecurity reports on the market that answer that question-but which data-backed practices result […]

Read more

As the global globe continues to handle formidable challenges, one of the numerous things impacted is cybersecurity. While recent problems have been varied, they will have all contributed to excellent uncertainty. How do organizations keep protect and solid their environments amidst thus much volatility? Lately we’ve been speaking a lot around security resilience , and […]

Read more

<span data-contrast=”auto”> The past year or two have delivered </span> <a href=”https://www.cisco.com/c/en/us/products/security/security-resilience.html?CCID=cc000160&OID=pstsc029595&DTID=oblgcdc000651″ target=”_blank” rel=”noopener”> <span data-contrast=”none”> safety resilience </span> </a> <span data-contrast=”auto”> to the forefront. How do organizations round the global world create resilience when uncertainty may be the new normal? How do we be better ready for whatever is following on the danger horizon? […]

Read more

Company continuity and disaster recuperation (BCDR)-cybersecurity’s neglected middle kids. BCDR gets no regard. It’s delegated down or relegated out. It’s virtually a rite of passage for a junior protection analyst to defend myself against BCDR documentation.     So, imaginable our shock when disaster recuperation was defined as the 4th strongest contributor to creating a successful […]

Read more