Saved by Chad Hudson
Cybersecurity Outcomes: What Do We Really Want?
The truth is that in today’s hyperconnected world, maturity-based cybersecurity programs are no longer adequate for combatting cyberrisks. A more strategic, risk-based approach is imperative for effective and efficient risk management (Exhibit 2).
Jim Boehm • The Risk-Based Approach to Cybersecurity

When you've created this kind of culture, management expectations are rooted in reality, where everyone considers their effect on the organization's security posture, and CISOs aren't faced with surprises, resistance, and friction that make them want to quit. If you advocate with the clarity that most cannot find in cybersecurity, you will achieve
... See moreDark Reading • Rethinking Cybersecurity's Structure & the Role of the Modern CISO
Best Practices Q&A: Guidance About What Directors Need to Hear From CISOs — From a Board Member
bacohidolastwatchdog.com5 Tips for Successfully Navigating C-Suite and Board Communication as a CISO
Cloud Security Alliancecloudsecurityalliance.orgI had a client whose maturity scores didn’t improve over a 3-year period. If data was all that was presented this could easily be interpreted as a failure of progress. But when they focused the narrative around the successful integration of the multiple acquisitions they had over the past few years, the focus shifted to the successful expansion of
... See more