CISO

Show
You’ve got a digital strategy, but how are you managing digital risks?
February 7, 2019

Download a free copy of Digital Risk: The C-Suite‘s Critical Missing Part of Overall Risk Most C-level executives I speak …

read more

CISO Spotlight: Security Goals and Objectives for 2019

February 7, 2019

I recently joined our ShadowTalk podcast to discuss 2019 planning and prioritization. If you listen, you will notice that I’m …

read more

Leveraging the 2018 Verizon Data Breach Investigations Report

April 10, 2018

Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 …

read more

One CISO’s Recommendations for Making the Most of RSA Conference Sessions

April 9, 2018

Last week, Enterprise Strategy Group (ESG) principal analyst, Jon Oltsik, wrote an article for CSO titled: “RSA Conference: CISOs’ top …

read more

A New CISO Looking to See How Deep the Rabbit Hole Goes

December 12, 2017

Well it is official, I’m now the Chief Information Security Officer here at Digital Shadows. It has been while since …

read more

WannaCry: The Early 2000s Called, They Want Their Worms Back

May 12, 2017

Earlier today it was revealed that the United Kingdom’s National Health Service was targeted by ransomware known as “WannaCry.” Sixteen …

read more

Two Ways to Effectively Tailor Your Intelligence Products

January 17, 2017

In my previous blog, “Trump and Intelligence: 6 ways to deal with challenging intelligence consumers,” I focused on six ways …

read more

5 Takeaways From The “Building A Strategic Threat Intelligence Program” Webinar

July 26, 2016

Last week, the great Mike Rothman (of Securosis fame) and I did a webinar titled: “Building a Strategic Threat Intelligence …

read more

Moar Sand!

March 10, 2016

Let’s face it, many organizations have their heads in the sand. In some cases this choice is a deliberate one; …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive