by Heath Nieddu | Feb 14, 2024 | Uncategorized
I’m almost halfway done with the pre-requisites for my PhD. It feels good to be making headway. I created a word cloud of all the papers I’ve reviewed so far in order to see if any themes emerged. I was surprised to see the theme of ‘big data’...
by Heath Nieddu | Dec 6, 2023 | Cyber Security
This post serves to gather some of the discussion points, questions, and further resources regarding the topic of cyber insurance discussed at the 2023 Planet Cyber Security Conference in San Diego 12/06/2023. Bottom Line Up Front: The majority of the group felt that...
by Heath Nieddu | Jul 23, 2023 | BCDR, Cyber Security, Incident Response, Uncategorized
Scenario Planning (SP) exercises can differ depending on the industry and managerial level. Strategic leadership, information system leadership, and academia all view SP differently. Before understanding SP, we need to wade through the sometimes-confusing terms of...
by Heath Nieddu | Jul 12, 2023 | Cyber Security, Security Teams, Trust, Vendor Management
Vendor security questionnaires were always discussed with an eye roll when I started in this field in 2008. We assigned an analyst to address the concerns of our partners. We also assigned a security architect to send our security questionnaires to our growing list of...
by Heath Nieddu | May 11, 2023 | Cyber Security, Insider Threat
Mitigating insider threats presents a unique problem for information security leaders. Authorized users are carrying out harmful actions by performing tasks that may appear to be part of their day-to-day work. This is the salient detail that keeps insider threat...