Cyber is a beautiful thing. “All great things are risky and, as the saying goes, what is beautiful is difficult.” Plato For the Cognitive CISO, the question arises, “what is the ultimate purpose of the work you do?” Now Think about the word “PURPOSE.” What comes to mind? Something worthwhile? Something grand and noble? Something […]Read More It’s A Beautiful Thing
Let’s face it: All too often, our quest for security and creating an environment that meets all the regulatory obligations is a succession of hassles. There’s an endless stream of frustrations, inconveniences, complications, disappointments, and potential disasters lurking in most of our daily experiences in securing the enterprise and governing the cyber world. We all […]Read More Where are the CISO Hassles?
“I assure you that I had rather excel others in the knowledge of what is excellent, than in the extent of my power and domination.” – Alexander the Great First, write down on a blank sheet of paper what your concept of “excellence” means to you as a CISO. Now read that definition you just […]Read More CISO, Do you seek Power, Dominance or Excellence?
Simon & Garfunkel sang a song entitled “The Dangling Conversation.” I am going to improvise a verse: “Yes, we speak of things that matter With words that must be said “Can analysis be worthwhile?” “Is Cobol really dead?” Well, not dead, dead, but I would say “Cobol” is definitely in “God’s Waiting Room.” A large […]Read More The Dangling Conversation
When the Cognitive CISO think about the future of cybersecurity, they should be thinking about the emerging trends in technology and threat landscapes, and where they intersect with science, and philosophy, and physics. I have a saying in the world of cyber: “As a CISO, We see the storm coming before the clouds arrive.” Big Data […]Read More Cognitive CISO: Blindsight?
Security on the internet has become more important with each passing year. It seems like every other month there is a major data breach from major retailers or online properties. One of the key things that you can do to minimize the effect these breaches will have on you is to set up and use… via […]Read More Two-factor authentication: Why do I need it? What are the best apps? — 9to5Mac
For starters, many may think “cognitive systems” and “legacy systems” is an oxymoron. Cognitive Systems should be the mantra of every CISO. Cognitive systems involve self-learning attributes within the application that uses data mining, pattern recognition, and natural language processing to mimic the way we as humans think, work and act. Most “legacy systems” especially […]Read More Cognitive CISO and Legacy