4 min read
Thoughts on MM-ISAC's 2025 Annual Conference
Now that I've returned home from MM-ISAC's Annual conference and have caught up a bit, I wanted to share my thoughts on this year's conference.
Read More
4 min read
Now that I've returned home from MM-ISAC's Annual conference and have caught up a bit, I wanted to share my thoughts on this year's conference.
Read More
1 min read
Every year, MM-ISAC recognizes member companies and individuals who go above and beyond to support its mission to improve cyber resilience in the...
3 min read
Cyber incident response is often viewed as a technical domain, with practitioners skilled in malware reverse engineering, network and host forensics,...
7 min read
I’ve talked about security cost as the key metric to report on your security program when working with executives and the board. What we have not...
2 min read
As security practitioners and leaders, we must contribute to the professionalization of our field by searching out data and evidence-based solutions...
3 min read
As I talk through the practical application of the security cost framework with our members, we are consistently running into a common stumbling...
3 min read
Phishing is a significant compromise vector for all companies in all industries. At theMining and Metals ISAC annual conference in November, we...
4 min read
After my last post on using Security Cost as a metric and the basis for a core security team/CISO objective, a few Mining and Metals ISAC members...
2 min read
Now that most MM-ISAC member organizations impacted by CrowdStrike's issue on Friday are through the worst of the recovery, I want to share some...
9 min read
In last quarter's article, I discussed the process for established IT Security teams to expand their influence into OT. This quarter I want to give...