CISO and Security Leader

Robert Wood
Members Public

From Words to Action: Crafting OKRs and Assembling the Team

Our last two posts in this series have discussed building a cybersecurity strategy and then communicating it to those needing to know. This need to develop a robust cybersecurity strategy is only getting more significant. However, the strategic plan doesn't add value until it is turned into action.

Frank Domizio
Members Public

Soft Skills: The Key to Successfully Implementing Your Cybersecurity Strategy

Last week, Rob talked about how to formulate a cybersecurity strategy.  This week, we would like to take the next step and discuss ways to implement that strategy. Developing and implementing a cybersecurity strategy is critical for protecting sensitive data, maintaining business continuity, and building customer trust. However, simply having

Robert Wood
Members Public

Developing an Effective Strategic Plan for Cybersecurity: Balancing Cybersecurity Risks and Business Goals

Writing a strategic plan is hard work. Writing a good one is very humbling. It's just words on a page, you might tell yourself, but this is the direction-setting document your organization will use to inform its work over the coming months to possibly years. Cybersecurity has become

Frank Domizio
Members Public

Breaking the Silence: How to Speak Truth to Power in Cybersecurity and Save Your Business from Disaster

Speaking truth to power is a critical aspect of cybersecurity. It ensures that decision-makers are informed about the actual state of their organization's cybersecurity posture. The facts we're referring to are accurate and complete information about the organization's security risks, vulnerabilities, and potential threats.

Robert Wood
Members Public

From Good to Great: The 5 Pillars of a High-Performance Cybersecurity Culture

Cybersecurity culture across an organization is a huge determinant of success or failure, failure or resilience. What does culture mean to cybersecurity, though? Is it security awareness? Is it the collaboration between security teams and other functional teams? Is it the willingness of people to report potential security incidents? Maybe