As many of you know, I recently started a new role as Chief Information Security Officer for a private company. I firmly believe that taking on the role of CISO isn't just about securing data; it's also about building relationships. In today's digital age, where security threats are fast-moving and
Try as we might, security teams are often subject to the same sort of echo chamber groupthink dynamics that any other function might experience. There are subtle messages or biases that can creep into our collective consciousness and cause significant harm. This article will break down what I see as
Last week's article focused on how individuals working in cybersecurity can better care for their mental health. The silent adversary in cybersecurity. This week, we will build on this and talk about things leaders can do to create and cultivate a team culture that supports mental health. This applies to
Explore the unspoken impact of cybersecurity on mental health in our article. Discover the hidden challenges and the path to a healthier cyber-work balance.
Learn how to simplify complex cybersecurity concepts for non-IT professionals. Bridge the gap, foster collaboration, and empower colleagues to actively participate in cybersecurity discussions. Enhance your organization's security posture with shared understanding.
The rise of generative AI tools has ushered in a new era in modern businesses, bringing with it untapped potential as well as unprecedented challenges. This technology has exploded onto the scene, and there are no signs that it will be slowing down anytime soon. Some organizations have decided that
We here at Soft Side of Cyber are excited to share this new three-part series with you in which we'll go into the heart of diversity, equity, and inclusion (DEI) in the cybersecurity sector. Today, we'll begin the series by discussing the significance of diversity in cybersecurity. Then, the following
Our last two posts in this series have discussed building a cybersecurity strategy and then communicating it to those needing to know. This need to develop a robust cybersecurity strategy is only getting more significant. However, the strategic plan doesn't add value until it is turned into action. This article
Last week, Rob talked about how to formulate a cybersecurity strategy. This week, we would like to take the next step and discuss ways to implement that strategy. Developing and implementing a cybersecurity strategy is critical for protecting sensitive data, maintaining business continuity, and building customer trust. However, simply having
Writing a strategic plan is hard work. Writing a good one is very humbling. It's just words on a page, you might tell yourself, but this is the direction-setting document your organization will use to inform its work over the coming months to possibly years. Cybersecurity has become a hot
Speaking truth to power is a critical aspect of cybersecurity. It ensures that decision-makers are informed about the actual state of their organization's cybersecurity posture. The facts we're referring to are accurate and complete information about the organization's security risks, vulnerabilities, and potential threats. In today's increasingly interconnected and digital
Cybersecurity culture across an organization is a huge determinant of success or failure, failure or resilience. What does culture mean to cybersecurity, though? Is it security awareness? Is it the collaboration between security teams and other functional teams? Is it the willingness of people to report potential security incidents? Maybe