New frontiers require new perspectives in people, process and technology. This blog demystifies data and describes how it is critical to every effective cybersecurity program. Darrell is currently a cyber security advisor. He is also a member of the advisory board of the Ithaca College Cybersecurity Program, and 6 year member of the Cloud Security Alliance. You can find him on LinkedIn.
What Is Zero Trust Anyway?
About three minutes into planning this post, I had one of those “god, I am old” moments. Here is why I had the moment. I have worked in cybersecurity since 1994. My first job was at a big 3 working for the U.S. government through one of the world’s...
Data Classification: Building, and Pitching, a Rock Solid Program
In our final installment, we are going to discuss how you roll all the concepts previously covered into a plan of action. The difference between the success and failure of a data classification program is a lack of action. I have reviewed over 10 programs in my...
Data Classification – How to Categorize It, Where to Store It
Previously, we discussed the requirements of a mature data classification program. In this post, we are going to review the administrative mechanics of such a program. Data classification, you’ll recall, usually includes a three- or four-layer system akin to the...
Data Classification – What It Is, Types & Best Practices
Data classification can help secure your data for compliance and company policy. But where should you even begin in the classification process? To start, let’s go through the main data classification types. The four main classifications for data are: restricted...
Interviews and Panels
The Secret to CISO Success? Be Offensive.
Just about anyone who engages in some form of competition knows the best defense is a good offense. When an opponent moves or strikes first, he is in control and therefore possesses a strategic advantage. Modern CISOs have adopted this approach but it represents a shift in thinking. Cybersecurity originated as a defensive action. CISOs focused on repelling attacks and preventing data from unauthorized access.