Author Archives: Rafeeq Rehman

About Rafeeq Rehman

Consultant, Author, Researcher.

Building a Successful Security Operations Center (SOC) Part Two – Estimating SOC Budget – CISOcast

Budget estimates are a major part of SOC business case. A typical budget will consist of capital cost, payroll expenses, and annual recurring costs. The budget estimates also helps in making decision about build an internal SOC or using SOC … Continue reading

Posted in Leadership | Comments Off on Building a Successful Security Operations Center (SOC) Part Two – Estimating SOC Budget – CISOcast

Disruptive Technologies Every CISO Should Know – CISOcast

Information Security is a rapidly changing field as advancements due to disruptive technologies, like SDN, IoT, NFV and others, have direct impact on security management programs. Information Security professionals, in general, are perceived to be slow in  adapting to new technologies … Continue reading

Posted in Leadership | Comments Off on Disruptive Technologies Every CISO Should Know – CISOcast

Lack of Security and Network Resources: A Major Hurdle in Digital Transformation

Initiatives for Digital Transformation are at front and center of every major corporation to keep their business competitive and relevant. Many technology research organizations are publishing papers about different aspects of digital transformation, which is categorized  as a new industrial … Continue reading

Posted in Digital Transformation, InfoSec, IoT, Leadership | Tagged , , | Comments Off on Lack of Security and Network Resources: A Major Hurdle in Digital Transformation

2016 CISO MindMap – What do InfoSec Professionals Do?

Please note that this is an older post An updated MindMap available here. It took some time to update the CISO MindMap but finally it is here. Thanks to all who provided suggestions for this update. A very rapid change … Continue reading

Posted in cisomindmap, InfoSec, IoT, Leadership | Tagged , , , , | Comments Off on 2016 CISO MindMap – What do InfoSec Professionals Do?

IoT Design Review

Embedding security into architecture and design of major IoT projects is the best way to catch problems earlier, avoid costly patchwork, lower the risk of data breaches, and to meet compliance needs. However, research shows that most of the times … Continue reading

Posted in InfoSec, IoT | Tagged , , , | Comments Off on IoT Design Review

How Small Things are Making Big Difference

IoT is not only about connecting machines; the technology can do countless other amazing things. Recently I had the privilege of working with few non-profit organizations promoting education. The solution involved Raspberry Pi, which is used in many IoT application, to … Continue reading

Posted in Education, IoT | Tagged , | Comments Off on How Small Things are Making Big Difference

Breaking the Phishing Attack Chain

Phishing is becoming a major threat vector and preferred method for attackers to break into victim networks. Verizon Data Breach Investigations Report shows that more than two-third attacks in espionage category used phishing as an attack vector. Typical phishing attacks … Continue reading

Posted in InfoSec | Comments Off on Breaking the Phishing Attack Chain

Verizon Data Breach Digest – A Must-Read for CISOs

Data Breach Digest is the latest report from Verizon RISK team. This is the same Verizon team that publishes Verizon Data Breach Investigations Report or more commonly known as DBIR. The main idea behind the Data Breach Digest is to … Continue reading

Posted in InfoSec | Comments Off on Verizon Data Breach Digest – A Must-Read for CISOs

A Three-Step Approach to Build IoT Business for Manufacturers

Manufacturers have been building products (or things) for a very long time. A major shift is in the competitive landscape is about making these products or things “smart”. Now, people not only need a light bulb, but they want a … Continue reading

Posted in IoT | Tagged , | Comments Off on A Three-Step Approach to Build IoT Business for Manufacturers

Internet of Things (IoT) and Why It Matters Now

IoT is all about connecting devices and machines to the Internet who can talk to each other, collect and share data, analyze the data, and bring business value out of data analytics. A fair argument is that we have been … Continue reading

Posted in InfoSec | Tagged , , | Comments Off on Internet of Things (IoT) and Why It Matters Now