The Disclaimer:
Just to be clear, nothing that I write here represents the position or opinion of my employer. Nothing I write here is proprietary or confidential to my employer. Everything I write here is my personal opinion.Pages
Subscribe to Security & Cigars
Follow me on Twitter
My Tweets-
Recent Posts
Archives
Recent Comments
- David Elfering on Back to Normal
- Terry Holberton on How To Get My Attention
- Vaughn Harring on Eric Update
- ecowper on Cigars
- Mike Childs on Cigars
Categories
- Alcohol
- Apple
- Being A Grown-Up
- Big Data
- Board Responsibilities
- BYOD
- Career
- Cigars
- Cloud
- Conferences
- Consumer Devices
- CyberWar
- Doing Adulting Right
- Food
- FUD
- General
- Government
- Health
- Home
- InfoSec
- Life and Times
- Military
- Mobility
- Pandemic
- Penetration Testing
- Please Advise
- Risk Management
- Security
- Smoking
- Teamwork
- Technology
- Travel
- Travel
- Uncategorized
- Vulnerability Management
Tag Archives: Gartner
What Is A Good Security Program?
What distinguishes a good security program? One of the hardest questions to answer in the Information Security field is whether our security program is good, or not. It’s a question we want to answer for many reasons, not least of … Continue reading
Posted in InfoSec, Penetration Testing, Risk Management, Security, Vulnerability Management
Tagged APT, Gartner, Good Security, infosec, security, The Basics
Comments Off on What Is A Good Security Program?
Vulnerability Management Re-Visited
I know, boring topic. Just part of IT and Security operations. Nothing sexy here. It’s way more fun to think about how to beat those nasty, mean APT’s, how to detect malware actively on your network, how to do fancy … Continue reading
Posted in InfoSec, Risk Management, Security, Vulnerability Management
Tagged attack paths, ciso, Gartner, infosec, maturity model, TVM, vulnerability management
1 Comment
Gartner Security Summit Keynote
Paul Proctor got on stage and captured the attention of 2400 security professionals. He lampooned the NSA, brought the ghosts of security on stage and even highlighted my organization for the changes we’ve been able to accomplish. Key themes: BYOD, … Continue reading