About Rafeeq Rehman
Consultant, Author, Researcher.
As the use of GenAI models becomes increasingly prevalent, it’s crucial for organizations to ensure the security and ownership of their intellectual property. One way to achieve this is by running open-source GenAI models locally on your own infrastructure. Why … Continue reading →
Like this:
Like Loading...
In the realm of information security, the quest to effectively manage risk is paramount. However, amidst the myriad of frameworks available, distinguishing between those explicitly designed for risk management and those that serve as broader guidelines can be a daunting … Continue reading →
Like this:
Like Loading...
Many individuals outside the realm of cybersecurity often underestimate the intricacies involved in a security professional’s role. Since its inception in 2012, the CISO MindMap has served as a valuable educational resource, offering insights into CISO responsibilities and aiding security … Continue reading →
Like this:
Like Loading...
Four key considerations for business executives Harnessing the potential of Generative AI (GenAI) to create user applications that drive business value may appear daunting, yet it doesn’t need to be. With the GenAI field advancing swiftly and offering a plethora … Continue reading →
Like this:
Like Loading...
While responsibilities of leaders in information security are very extensive as shown in the CISO MindMap, following are seven foundational and “must-have” capabilities that every information security program should have. If any of these capabilities is missing, the first priority … Continue reading →
Like this:
Like Loading...
What is a Third Party Third parties generally refer to external entities with whom you enter into contractual agreements to deliver products or services. These external partners may offer essential services to support your business operations or extend services to … Continue reading →
Like this:
Like Loading...
Three use cases of Large Language Models (LLMs) to save time and immediately enhance productivity While there is tremendous hype around LLMs, many people in Cybersecurity are still struggling to put news tools like ChatGPT and Google Bard to practice. … Continue reading →
Like this:
Like Loading...
When a CISO joins a new organization, it is important to start with basics. Following is a TODO list for every new CISO. Subscribe to Blog
Like this:
Like Loading...
Posted in InfoSec, Leadership
|
Tagged ciso
|
As shown in CISO MindMap 2023, job of security professionals is complex and Security Operations Center (SOC) is a significant part of this job. SOC analysts are stressed out by overwhelming number of incidents and dealing with these incidents in a timely … Continue reading →
Like this:
Like Loading...
This post is an updated version of six fundamental principles that always fill my professional and personal life with joy, pleasure and satisfaction. So here they are! Subscribe to Blog Recent Posts
Like this:
Like Loading...