Chronicles of Cybersecurity Consulting - 1st in series
M. Yousuf Faisal
I help cyber & business leaders with Securing Things (IT, OT/ICS, IIOT, digital transformation/4.0 journey, & AI) & share everything I learn at securingthings.blog | securingthings.academy
Disclaimer: All views presented here, in this newsletter, are my own. Author or the newsletter are not liable for any actions taken by any individual or any organization / business / entity. The information provided is for education and awareness purposes only and is not specific to any business and or situation.
?M. Yousuf Faisal
Table of Contents
1. Chronicles of Cybersecurity Consulting
2. My Recent Most Viewed Posts:
3. My Asks
Before we begin, do me a favor and make sure to “Subscribe ” to let me know that you care and keep me motivated to publish more. Thanks! Note: remember to validate your email address to ensure that you don’t miss any future newsletter editions.
Hi Securing Things Community,
In this newsletter edition, am starting Chronicles of Cybersecurity Consulting from the field (1st in series - more to come in future, so stay tuned) - a slightly different write-up/style, compared to previous editions (hope you’ll enjoy), plus my recent most viewed social media posts from May 2024 and my asks.
1. Chronicles of Cybersecurity Consulting
I’ve been in the industry working in the technology and cybersecurity for more than two decades and while doing consulting / advisory and performing reviews, assessments, gap analysis or audits, had some fun and interesting moments. I’ll be sharing some, as part of chronicles of cybersecurity consulting.
领英推荐
Here’s one below and stay tuned for more in future posts.
Chronicle # 1 - The “Bleeding Password” for All Crown Jewels!
to continue reading - checkout the full edition on Securing Things newsletter at:
Hope you enjoy.
Don't forget to comment below on the question in above newsletter edition.
Also, checkout:
Until next time. Stay tuned..
It's a great day to start "SecuringThings" for Smart & Safer Society!
I help cyber & business leaders with Securing Things (IT, OT/ICS, IIOT, digital transformation/4.0 journey, & AI) & share everything I learn at securingthings.blog | securingthings.academy
6 个月-> How would you approach helping the DB/system admin? -> what best practices in terms of people, process and technology controls were missing? -> what you’ll recommend them in addition, as short, medium to long term remediations? -> and why?