by Heath Nieddu | Dec 6, 2023 | Cyber Security
This post serves to gather some of the discussion points, questions, and further resources regarding the topic of cyber insurance discussed at the 2023 Planet Cyber Security Conference in San Diego 12/06/2023. Bottom Line Up Front: The majority of the group felt that...
by Heath Nieddu | Jul 23, 2023 | BCDR, Cyber Security, Incident Response, Uncategorized
Scenario Planning (SP) exercises can differ depending on the industry and managerial level. Strategic leadership, information system leadership, and academia all view SP differently. Before understanding SP, we need to wade through the sometimes-confusing terms of...
by Heath Nieddu | Jul 12, 2023 | Cyber Security, Security Teams, Trust, Vendor Management
Vendor security questionnaires were always discussed with an eye roll when I started in this field in 2008. We assigned an analyst to address the concerns of our partners. We also assigned a security architect to send our security questionnaires to our growing list of...
by Heath Nieddu | May 11, 2023 | Cyber Security, Insider Threat
Mitigating insider threats presents a unique problem for information security leaders. Authorized users are carrying out harmful actions by performing tasks that may appear to be part of their day-to-day work. This is the salient detail that keeps insider threat...
by Heath Nieddu | May 11, 2023 | Cyber Security, Security Teams
As an industry, security teams often operate in isolation, not receiving transparent, reliable data about the experiences of others. Throughout the profession, pockets of innovation exist, but these innovations are not uniformly deployed to the field. The evolution of...
by Heath Nieddu | May 11, 2023 | Cyber Security, Identity and Access Managment
M&A activity is on the rise, presenting challenges to identity and access management (IAM) programs, but also providing opportunities to aid deal integration. The increase in global activity will challenge security teams, demand the utmost of current IAM programs,...