Here is my newsletter for week #29 in 2024, with links to the main posts and articles that I marked/tagged during this past months (I haven't posted one of these for a while).
- Check out this really cool interview
with me about thecyberboardroom.com
, published by Dan Raywood
and SC Magazine UK.
- "The Cyber Boardroom: Why, How, and What (v0.4 - First MVP)
" newsletter article that dives deep into the ideas and concepts behind the platform I'm creating to bridge the gap between cybersecurity professionals and business stakeholders. Let me know what you think.
- Here is the list of all the currently supported LLMs platforms, providers, and models that you can try on this 'Chat with LLMs' UI: https://lnkd.in/ecGduU6b
.
- Here is a good example of the power of LLMs ability to understand screenshots. I was able to just ask Athena what companies to talk about Web AppSec
based on a copy & paste of a bunch of logos
- Here is a ChatBot UX MVP
that uses HTML forms to interact with users instead of text. This has enormous potential to make the user experience much smoother and really starts to move the LLM's role into the 'Business Layer,' which is where I think it needs to be.
- "Helping a CFO Manage and Understand Their Cybersecurity Budget
" - here is a video showcasing an example of the workflows I'm excited to explore with the tech stack I'm developing at The Cyber Boardroom.
- Here is a really good example of the crazy hallucinations
?? that some main models still have. I asked multiple models about me and Simon Bennetts, and only Claude seemed to get it right ?.
- On my to-do list is to feed this
(and more relevant data) to the LLMs models I have wired up at The Cyber Boardroom and create these decks dynamically, customized to the audience and recipients. Same with these great resources for founders
which I’ll be using them myself!
- Completely agree with this analysis
, and this is exactly why I'm creating The Cyber Boardroom :) . We need to help Board Members to learn, consume and engage with Cyber Security topics, and we need CISOs (and other security execs) to be able to effectively communicate with those Board members (with 100% personalised and custom messaging, data and results).
- It’s not as high as I would like it to be, but the code coverage of the ChatBot Javascript components
used by The Cyber Boardroom is going on the right direction.
- These lawsuits
are going to make a massive difference, and they really highlight how important effective cyber security disclosures and incident handling really are.
- Very interesting analysis and discussion
on the research done by Bob Zukis
on who is against companies disclosing their board's cyber security expertise.
- Really good insights
from Phil Venables
. One way I handle this paradox is by actually creating more incidents :) I get the team and business to handle cyber security P3s as P1s, which does wonders to improve preparedness, streamline processes, and raise key stakeholders' awareness of what the security team (and budget) is doing.
- This is a great video with references/examples of successful CISO women
, inspiring the next generation.
- Is there a good AI model that is good at understanding and annotating images/graphs? See the PDF
for my (unsuccessful) attempt with ChatGPT in trying to create such a 'graph + annotation of key moments.'
- Are there good examples of prompts like the one mentioned in this article
that break multiple LLMs?
- How long until Social Media is considered an addiction
and is regulated as a health issue?
- Wardley Mapping: one to watch
- Lots of great talks on AI here
.
- To read
– a compilation of teachings and resources by Andreessen Horowitz
Founder & CEO at Easexpense
3 个月Insightful curation. Captivating AI narratives spark curiosity, introspection.
Data Protection Officer and Local Councillor
3 个月Wow. A lot to unpack here. On social media addiction (or should that be mobile use addiction), just take a moment to look at the people around you. How many are staring at their phones, unaware of their surroundings. I can't say it's a good or bad thing. But if you didn't know what a mobile phone was, what would you think if you saw this phenomenon? It's definitely weird, and I'm doing it right now...
Owner, Internet Security Auditors, OWASP Spain Chapter Leader. OSINT, SOCMINT, Hacking. Tinfoleak author. Co-author of the book "Open Source Intelligence (OSINT) - Investigar personas e identidades en Internet".
3 个月Hi Dinis! Thanks for sharing!