Rob Labbé

3 min read

Effective Incident Response Starts Long Before the Incident

Cyber incident response is often viewed as a technical domain, with practitioners skilled in malware reverse engineering, network and host forensics, and a wide range of other DFIR skills. If those skills are not available in-house, many 3rd parties...

Read More

7 min read

Moving to Security Cost as a Metric

I’ve talked about security cost as the key metric to report on your security program when working with executives and the board. What we have not...

Read More

2 min read

Phishing Education - Maybe 'Best Practice' is not Best After all

As security practitioners and leaders, we must contribute to the professionalization of our field by searching out data and evidence-based solutions...

Read More

3 min read

Precision vs Accuracy When Predicting Security Cost

As I talk through the practical application of the security cost framework with our members, we are consistently running into a common stumbling...

Read More

3 min read

Building a Phishing Program

Phishing is a significant compromise vector for all companies in all industries. At theMining and Metals ISAC annual conference in November, we...

Read More

4 min read

Digging Into Security Cost

After my last post on using Security Cost as a metric and the basis for a core security team/CISO objective, a few Mining and Metals ISAC members...

Read More

2 min read

The CrowdStrike Incident - Resilience Matters

Now that most MM-ISAC member organizations impacted by CrowdStrike's issue on Friday are through the worst of the recovery, I want to share some...

Read More

9 min read

Making Your Operation More Cyber Resilient

In last quarter's article, I discussed the process for established IT Security teams to expand their influence into OT. This quarter I want to give...

Read More

12 min read

Integrating IT and OT Security - A 6 Step Cycle

For those of you who missed our first webinar of the year, I discussed a process for integrating IT and OT security —specifically, extending your IT...

Read More