Enabling AI Adoption: Building the Foundation for Trusted Innovation with Continuous Data Risk…Part 1 of 2.Oct 29Oct 29
The Foundational Elements of CDREM: Explicit Inputs = SuccessBuilding on the series: Introducing Continuous Data Risk Exposure Management and Continuous Data Risk Exposure Management in Practice.Sep 17Sep 17
Continuous Data Risk Exposure Management: A PrimerI’ve sat through far too many meetings where “data risk” is reduced to encryption checkboxes and permission settings — shallow…Jul 28Jul 28
Solorigate, the ‘Pyramid of Pain’, and the Future of Mitigation: A Rapid AssessmentThe most painful aspects to change within the attacker’s stack are those things the attacker cannot control.Dec 22, 2020Dec 22, 2020
A Short Guide to Hackathon SuccessTime appreciation, asking the right questions, undigitize, scoping… a partial recipe for successApr 2, 2019Apr 2, 2019
Lessons from the Equifax Data Breach ReportThis month’s House Oversight & Government Committee report about the Equifax data breach is worthwhile reading for cybersecurity…Dec 18, 2018A response icon2Dec 18, 2018A response icon2
Continuous Improvement to Enterprise Risk Management: The Risk RegisterI recently delivered a presentation to members of ISACA’s Toronto Chapter. I’ve taken the research and feedback from the talk to draft an…Apr 16, 2018Apr 16, 2018
Enterprise Remediation Continuous Improvement: The Risk RegistryA recent GAO report examines the maturity of 24 US Government departments’ security regimes. While subject to different standards and…Oct 5, 2017Oct 5, 2017