3 Years and 80+ Articles

3 Years and 80+ Articles

Someone recently asked me for a full list of all of the articles I wrote for IBM's SecurityIntelligence blog. Here's the full list, with the most recent near the top. My first article appeared in June 2015.

7/31/2018, How to Become an Articulate Leader and CISO in Five Steps

7/20/2018, New NIST Guidebook Says Cybersecurity is Everyone’s Job — Here’s Why

7/17/2018, Key Questions for Effective Cyber Risk Management From the ISO 31000:2018

7/9/2018, How to Get Directors On Board With Cyber Risk Governance

5/17/2018, What Does PwC's Annual Corporate Directors Survey Tell Us About Cyber Risks?

5/9/2018, What Is the Current State of Cyber Resilience?

4/24/2018, Key Takeaways from the Center for Audit Quality's Cybersecurity Risk Management Oversight Tool

4/18/2018, Lessons From the Marsh 'Global Cyber Risk Perception Survey'

4/30/2018, When It Comes to Cyber Risks, Your Leadership Cannot Afford a Failure of Imagination

4/10/2018, 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines

3/28/2018, Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

3/20/2018, When It Comes to Cyber Risks, 2018 Is No Time to Play Games

2/27/2018, SEC Releases Updated Guidance For Cybersecurity Disclosure

2/23/2018, Listen to Your Cassandras to Avoid Cybersecurity Disasters

3/13/2018, Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

2/5/2018, Lessons From the World Economic Forum's Cyber Resilience Playbook

1/29/2018, Highlights From the World Economic Forum’s ‘Global Risks Report 2018’

1/25/2018, Is your CISO a Jedi warrior, an admiral, or a diplomat?

1/11/2018, Four Key Lessons From NACD’s ‘2018 Governance Outlook’ About Managing Cyber Risks

1/9/2018, Where the CISO Should Sit on the Security Org Chart and Why It Matters

12/27/2017, Lessons From the EY ‘Global Information Security Survey’

1/2/2018, Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018

12/18/2017, Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

12/11/2017, Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction

11/20/2017, Delegate Cyber Risk Management Using the Three Lines of Defense Model

11/2/2017, What Can We Learn From the ‘Global State of Information Security Survey 2018’?

10/25/2017, Employees Must Wash Hands: Translating Awareness Into Security Hygiene

10/9/2017, Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle

9/25/2017, Eight Cybersecurity Lessons Star Trek Teaches Us

9/28/2017, Six Key Traits of an Effective Cyber Risk Advisor

9/18/2017, No Time for Techno-Babble: Four Key Traits of Quality CISO Reports

9/7/2017, Aiming for a Security Career? Consider a Liberal Arts Degree

8/24/2017, Board Directors Need to Get Involved With Cyber Risk Governance

8/14/2017, Testing Top Leadership's Muscle Memory With Data Breach Simulations

6/28/2017, Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks

6/6/2017, Closing the Awareness Gap Requires a Team Effort

5/22/2017, Cybersecurity Hiring Woes? Time to Consider a New Collar Approach

5/26/2017, Security Awareness - Three Lessons from Health Campaigns

5/15/2017, Five Strategies for Recent Grads to Close the Awareness Gap

5/8/2017, Five Whys: Lessons From the World of Incident Investigations

4/4/2017, Cyber-Resilience Principles and Tools for Boards

3/21/2017, Five Ways to Improve the CISO-Board Relationship

3/27/2017, Three Lessons From Test-Driven Development

3/23/2017, The CISO as a Digital Trust Diplomat

3/6/2017, Building a Cybersecurity Culture Around Layer 8

2/8/2017, NACD Publishes 5 Cybersecurity Principles Every Board Director Needs to Know

2/3/2017, Highlights From the World Economic Forum's Global Risks Report 2017

1/18/2017, Five Ways to be a More Effective CISO in 2017

1/12/2017, Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style

1/5/2017, Using Cognitive Security to Fight the Cybersecurity Borg

12/6/2016, Pivoting Toward Cognitive Security: Benefits and Challenges

11/29/2016, Cognitive Security Key to Addressing Intelligence and Accuracy Gaps

11/22/2016, The Role of Cognitive Security in Addressing the Incident Response Speed Gap

7/1/2016, 5 Ways To Help Your Alma Mater Take Data Security To The Next Level

6/21/2016, FTC Studying Manufacturers’ Mobile Device Security Update Practices

6/3/2016, The CISO Job Market in 2016 - Time to Jump Ship?

5/20/2016, Five Signs the CISO Who Got You Here Isn't The Best One To Get You There

5/4/2016, How to Make the Most of Your Pen Test

4/27/2016, Engaging Conversations Key to Improving Cyber Risk Decisions

4/19/2016, Securing the C-Suite, Part 3: All Eyes on the CEO

4/12/2016, Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs

4/5/2016, Securing the C-Suite, Part 1: Lessons for Your CIO and CISO

3/23/2016, It's Not Too Late to Correct Your Security Posture

3/17/2016, C-Suite Dynamics Can Impact The Organization's Cybersecurity

3/14/2016, FTC Studying Practices of Nine PCI Companies

3/1/2016, Is Your CISO Out Of Place?

2/12/2016, Is Your CISO Ready to Be a Risk Leader?

1/27/2016, 2015: The Year Feds Warned About Cyber Risks

1/20/2016, Highlights From the World Economic Forum’s Global Risks Report 2016

1/15/2016, Cyber Risks: Three Areas of Concern for 2016

1/4/2016, New Year’s Resolutions for the Effective CISO

12/30/2015. Get the Most Out of Your Recent Security Hires: The Value of Professional Development

12/18/2015, Get the Most Out of Your Recent Security Hires With Soft Skills

12/10/2015, Beyond Tech Skills: Leadership Qualities for CISOs

12/1/2015, How Should CISOs Report Cyber Risks to Boards?

11/19/2015, How Are US Armed Forces Closing the Cyber Skills Gap?

11/11/2015, What Can CISOs Take From the New NYSE Cybersecurity Guide?

10/28/2015, Five Must-Read Articles on the Cybersecurity Skills Gap

10/23/2015, What Cybersecurity Questions Are Boards Asking CISOs?

10/13/2015, Why Is Your Board of Directors Finally Asking About Cyber Risks?

10/9/2015, Addressing the Information Security Skills Gap in Partnership With Academia

10/5/2015, How Helping Educators Is Good for the Cybersecurity Industry

9/21/2015, CISO Influence: The Role of the Power Distance Index and the Uncertainty Avoidance Dimensions

7/9/2015, Cyber Risks: From the Trenches to the Boardroom

6/24/2015, Improving Your Security Awareness Campaigns: Examples From Behavioral Science

6/3/2015, As an Information Security Professional, Are You Having the Right Conversations?

?

Chris Veltsos

Cyber Risk Advisor | CISSP, CISA, QTE | Educator, Mentor, Author, Speaker | Cybersecurity & Systemic Risk

6 年

And one more: Global Perspectives on Cyber Resilience From the 'MMC Cyber Handbook' https://securityintelligence.com/global-perspectives-on-cyber-resilience-from-marsh-mclennans-2018-cyber-handbook/

回复
Chris Veltsos

Cyber Risk Advisor | CISSP, CISA, QTE | Educator, Mentor, Author, Speaker | Cybersecurity & Systemic Risk

6 年

And here's the latest one: Lessons From the ISO/IEC 27005:2018 Security RiskManagement Guidelines?https://securityintelligence.com/lessons-from-the-iso-iec-270052018-security-risk-management-guidelines/

回复
Jeremy Swenson, MSST, MBA

Digital ?? Strategy ?? & ?? Cyber Consultant to Leaders | Speaker ?? | Writer ??

6 年

Content is king

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了