3 Years and 80+ Articles
Chris Veltsos
Cyber Risk Advisor | CISSP, CISA, QTE | Educator, Mentor, Author, Speaker | Cybersecurity & Systemic Risk
Someone recently asked me for a full list of all of the articles I wrote for IBM's SecurityIntelligence blog. Here's the full list, with the most recent near the top. My first article appeared in June 2015.
7/31/2018, How to Become an Articulate Leader and CISO in Five Steps
7/20/2018, New NIST Guidebook Says Cybersecurity is Everyone’s Job — Here’s Why
7/17/2018, Key Questions for Effective Cyber Risk Management From the ISO 31000:2018
7/9/2018, How to Get Directors On Board With Cyber Risk Governance
5/17/2018, What Does PwC's Annual Corporate Directors Survey Tell Us About Cyber Risks?
5/9/2018, What Is the Current State of Cyber Resilience?
4/24/2018, Key Takeaways from the Center for Audit Quality's Cybersecurity Risk Management Oversight Tool
4/18/2018, Lessons From the Marsh 'Global Cyber Risk Perception Survey'
4/30/2018, When It Comes to Cyber Risks, Your Leadership Cannot Afford a Failure of Imagination
4/10/2018, 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines
3/28/2018, Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer
3/20/2018, When It Comes to Cyber Risks, 2018 Is No Time to Play Games
2/27/2018, SEC Releases Updated Guidance For Cybersecurity Disclosure
2/23/2018, Listen to Your Cassandras to Avoid Cybersecurity Disasters
3/13/2018, Practicing Your Crisis Response: How Well Can You Handle Right of Boom?
2/5/2018, Lessons From the World Economic Forum's Cyber Resilience Playbook
1/29/2018, Highlights From the World Economic Forum’s ‘Global Risks Report 2018’
1/25/2018, Is your CISO a Jedi warrior, an admiral, or a diplomat?
1/11/2018, Four Key Lessons From NACD’s ‘2018 Governance Outlook’ About Managing Cyber Risks
1/9/2018, Where the CISO Should Sit on the Security Org Chart and Why It Matters
12/27/2017, Lessons From the EY ‘Global Information Security Survey’
1/2/2018, Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018
12/18/2017, Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges
12/11/2017, Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction
11/20/2017, Delegate Cyber Risk Management Using the Three Lines of Defense Model
11/2/2017, What Can We Learn From the ‘Global State of Information Security Survey 2018’?
10/25/2017, Employees Must Wash Hands: Translating Awareness Into Security Hygiene
10/9/2017, Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle
9/25/2017, Eight Cybersecurity Lessons Star Trek Teaches Us
9/28/2017, Six Key Traits of an Effective Cyber Risk Advisor
9/18/2017, No Time for Techno-Babble: Four Key Traits of Quality CISO Reports
9/7/2017, Aiming for a Security Career? Consider a Liberal Arts Degree
8/24/2017, Board Directors Need to Get Involved With Cyber Risk Governance
8/14/2017, Testing Top Leadership's Muscle Memory With Data Breach Simulations
6/28/2017, Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks
6/6/2017, Closing the Awareness Gap Requires a Team Effort
5/22/2017, Cybersecurity Hiring Woes? Time to Consider a New Collar Approach
5/26/2017, Security Awareness - Three Lessons from Health Campaigns
5/15/2017, Five Strategies for Recent Grads to Close the Awareness Gap
5/8/2017, Five Whys: Lessons From the World of Incident Investigations
4/4/2017, Cyber-Resilience Principles and Tools for Boards
3/21/2017, Five Ways to Improve the CISO-Board Relationship
3/27/2017, Three Lessons From Test-Driven Development
3/23/2017, The CISO as a Digital Trust Diplomat
3/6/2017, Building a Cybersecurity Culture Around Layer 8
2/8/2017, NACD Publishes 5 Cybersecurity Principles Every Board Director Needs to Know
2/3/2017, Highlights From the World Economic Forum's Global Risks Report 2017
1/18/2017, Five Ways to be a More Effective CISO in 2017
1/12/2017, Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style
1/5/2017, Using Cognitive Security to Fight the Cybersecurity Borg
12/6/2016, Pivoting Toward Cognitive Security: Benefits and Challenges
11/29/2016, Cognitive Security Key to Addressing Intelligence and Accuracy Gaps
11/22/2016, The Role of Cognitive Security in Addressing the Incident Response Speed Gap
7/1/2016, 5 Ways To Help Your Alma Mater Take Data Security To The Next Level
6/21/2016, FTC Studying Manufacturers’ Mobile Device Security Update Practices
6/3/2016, The CISO Job Market in 2016 - Time to Jump Ship?
5/20/2016, Five Signs the CISO Who Got You Here Isn't The Best One To Get You There
5/4/2016, How to Make the Most of Your Pen Test
4/27/2016, Engaging Conversations Key to Improving Cyber Risk Decisions
4/19/2016, Securing the C-Suite, Part 3: All Eyes on the CEO
4/12/2016, Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs
4/5/2016, Securing the C-Suite, Part 1: Lessons for Your CIO and CISO
3/23/2016, It's Not Too Late to Correct Your Security Posture
3/17/2016, C-Suite Dynamics Can Impact The Organization's Cybersecurity
3/14/2016, FTC Studying Practices of Nine PCI Companies
3/1/2016, Is Your CISO Out Of Place?
2/12/2016, Is Your CISO Ready to Be a Risk Leader?
1/27/2016, 2015: The Year Feds Warned About Cyber Risks
1/20/2016, Highlights From the World Economic Forum’s Global Risks Report 2016
1/15/2016, Cyber Risks: Three Areas of Concern for 2016
1/4/2016, New Year’s Resolutions for the Effective CISO
12/30/2015. Get the Most Out of Your Recent Security Hires: The Value of Professional Development
12/18/2015, Get the Most Out of Your Recent Security Hires With Soft Skills
12/10/2015, Beyond Tech Skills: Leadership Qualities for CISOs
12/1/2015, How Should CISOs Report Cyber Risks to Boards?
11/19/2015, How Are US Armed Forces Closing the Cyber Skills Gap?
11/11/2015, What Can CISOs Take From the New NYSE Cybersecurity Guide?
10/28/2015, Five Must-Read Articles on the Cybersecurity Skills Gap
10/23/2015, What Cybersecurity Questions Are Boards Asking CISOs?
10/13/2015, Why Is Your Board of Directors Finally Asking About Cyber Risks?
10/9/2015, Addressing the Information Security Skills Gap in Partnership With Academia
10/5/2015, How Helping Educators Is Good for the Cybersecurity Industry
9/21/2015, CISO Influence: The Role of the Power Distance Index and the Uncertainty Avoidance Dimensions
7/9/2015, Cyber Risks: From the Trenches to the Boardroom
6/24/2015, Improving Your Security Awareness Campaigns: Examples From Behavioral Science
6/3/2015, As an Information Security Professional, Are You Having the Right Conversations?
?
Cyber Risk Advisor | CISSP, CISA, QTE | Educator, Mentor, Author, Speaker | Cybersecurity & Systemic Risk
6 年And one more: Global Perspectives on Cyber Resilience From the 'MMC Cyber Handbook' https://securityintelligence.com/global-perspectives-on-cyber-resilience-from-marsh-mclennans-2018-cyber-handbook/
Cyber Risk Advisor | CISSP, CISA, QTE | Educator, Mentor, Author, Speaker | Cybersecurity & Systemic Risk
6 年And here's the latest one: Lessons From the ISO/IEC 27005:2018 Security RiskManagement Guidelines?https://securityintelligence.com/lessons-from-the-iso-iec-270052018-security-risk-management-guidelines/
Digital ?? Strategy ?? & ?? Cyber Consultant to Leaders | Speaker ?? | Writer ??
6 年Content is king