Tag Archives: cybersecurity

PDF Version of Book: Cybersecurity Arm Wrestling available for download

The PDF version of my latest book “Cybersecurity Arm Wrestling – Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” is now available for download. You can share this link, print it, and use it … Continue reading

View post to subscribe to site newsletter.

Posted in Education, InfoSec, SOC | Tagged , , | Comments Off on PDF Version of Book: Cybersecurity Arm Wrestling available for download

Book “Cybersecurity Arm Wrestling” Published.

My latest book “Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” is published and available on amazon.com worldwide. This is a relatively short book with 11 chapters, three sections and about … Continue reading

View post to subscribe to site newsletter.

Posted in Leadership | Tagged , , , | Comments Off on Book “Cybersecurity Arm Wrestling” Published.

Achieving Excellence in SOC Operations and Incident Response

Draft of Chapter 7 of my book “Cybersecurity Arm Wrestling – Winning the perpetual fight against crime by building a modern Security Operations Center” is complete and available for download. This chapter is about “Operate” part of the “Plan-Design-Build-Operate” strategy and … Continue reading

View post to subscribe to site newsletter.

Posted in InfoSec, SOC | Tagged , , , | Comments Off on Achieving Excellence in SOC Operations and Incident Response

CISO Tools to Build (or Tweak) a Cybersecurity Roadmap, Create Business Case and Request Funding

I am not telling you anything new when I say that an essential part of a CISO’s job is to build a Cybersecurity program, communicate it to stakeholders, and continuously tweak it based upon continuously changing threat landscape. Job of … Continue reading

Posted in InfoSec, Leadership | Tagged , , , , , , , | Comments Off on CISO Tools to Build (or Tweak) a Cybersecurity Roadmap, Create Business Case and Request Funding

A Threat Modeling Process to Improve Resiliency of Cybersecurity Program

Many organizations with mature Cybersecurity program have implemented controls to safeguard their digital assets. However, controls can give a false sense of security as many times mere existence of a control does not mean that it is (a) adequate and/or (b) effective. Protecting crown jewels requires continuous monitoring and evaluating controls. This article describes a 5-step threat modeling process to improve resiliency of your program, identify gaps and close these gaps. Continue reading

View post to subscribe to site newsletter.

Posted in Digital Transformation, InfoSec, Leadership | Tagged , | Comments Off on A Threat Modeling Process to Improve Resiliency of Cybersecurity Program

Book: Cybersecurity Arm Wrestling – Chapters 1-3

Winning the perpetual fight against crime by building a modern Security Operations Center I am happy to announce that first three chapters of my book “Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations … Continue reading

View post to subscribe to site newsletter.

Posted in SOC | Tagged , , | Comments Off on Book: Cybersecurity Arm Wrestling – Chapters 1-3

Announcing Cybersecurity Learning Saturday

Continuous learning and skills development is an essential part of any Cybersecurity professional but they don’t get enough time during normal work week. So why not turn Saturdays into a collaborative learning events where people come to share knowledge, teach, … Continue reading

Posted in InfoSec | Tagged , | Comments Off on Announcing Cybersecurity Learning Saturday

Building a Successful Security Operations Center (SOC): Part 4

SOC Planning – Defining SOC Scope Defining scope for the SOC is crucial for its success and to determine stakeholders for the SOC. The scope will help determine cost, associates needed to run the SOC, SOC processes and many other … Continue reading

Posted in InfoSec, SOC | Tagged , , , , , , | Comments Off on Building a Successful Security Operations Center (SOC): Part 4

Information Security Leaders Handbook

Few years ago, I wrote Information Security Leaders Handbook but it was not listed as a download on this blog. With this post, I would like to put it here and also check the level of interest from InfoSec community … Continue reading

Posted in InfoSec, Leadership | Tagged , , , , | Comments Off on Information Security Leaders Handbook

CISO MindMap 2017 – What Do InfoSec Professional Really Do?

Note: An updated version of CISO MindMap (2018) is published here While Ransomware may be the talk of the town these days, many other profound changes are happening in the industry that impact job of information security professionals. Keeping in … Continue reading

Posted in cisomindmap, InfoSec, IoT, Leadership | Tagged , , , , | Comments Off on CISO MindMap 2017 – What Do InfoSec Professional Really Do?