Leadership

Frank Domizio
Members Public

Part 3: Fostering an Inclusive Workplace Culture for Cybersecurity Teams

Welcome back for the 3rd installment in our series about diversity, equity, and inclusion (DEI) in cybersecurity.  In the first piece, we spoke about how diverse teams help advance cybersecurity.  We discussed how a wider range of people and viewpoints aid in the detection and mitigation of novel security threats.

Robert Wood
Members Public

The Feedback Factor: How Effective Feedback Drives Cybersecurity Excellence

Technical skills and knowledge are undoubtedly essential for anyone working in cybersecurity, whether you're a pentester or a SOC analyst, or something else entirely. However, at Soft Side of Cyber, we believe that the true potential of cybersecurity professionals can only be unlocked when they excel in their

Robert Wood
Members Public

From Words to Action: Crafting OKRs and Assembling the Team

Our last two posts in this series have discussed building a cybersecurity strategy and then communicating it to those needing to know. This need to develop a robust cybersecurity strategy is only getting more significant. However, the strategic plan doesn't add value until it is turned into action.

Robert Wood
Members Public

Developing an Effective Strategic Plan for Cybersecurity: Balancing Cybersecurity Risks and Business Goals

Writing a strategic plan is hard work. Writing a good one is very humbling. It's just words on a page, you might tell yourself, but this is the direction-setting document your organization will use to inform its work over the coming months to possibly years. Cybersecurity has become

Frank Domizio
Members Public

Breaking the Silence: How to Speak Truth to Power in Cybersecurity and Save Your Business from Disaster

Speaking truth to power is a critical aspect of cybersecurity. It ensures that decision-makers are informed about the actual state of their organization's cybersecurity posture. The facts we're referring to are accurate and complete information about the organization's security risks, vulnerabilities, and potential threats.