The 3 questions to ask during an cybersecurity interview

Interviewing, and being interviewed for that matter, can be a stressful event.  If your like me, than it doesn't matter which side of the table your on.  You approach this situation with the same focus and zeal you do a…

An introduction to the Cryptocurrency Security Standard (CCSS)

The Cryptocurrency Security Standard (CCSS) Good morning everyone, today I bring to you a short post on a relatively new development in the crypto-cyber security world. First lets level set with everyone so we can understand why we are talking…

Your guide to DeFi aka OPEN finance

If you think back to my introduction to Crypto, which is found here: https://infosecforhumans.com/crypto-for-humans-or-anyone-in-tech/ - You will remember that crypto is attractive because it is decentralized, not controlled by a central bank or government.  This idea is…

Crypto 101 for humans (or anyone in tech)

Hello crypto In this article I want to introduce some critical concepts for success in the crypto world.  The ideas covered in this blog post are aimed at anyone who still feels like crypto just isn't for them, but they…

Who should the CISO report to?

For my non-technical friends and people who are on the perimeter of tech (or even security for that matter), the question of who does the CISO report to is a not a question at all. They always espouse the standard…

What is the Minimum Viable Secure Product (MVSP)? And why should I care?

What problem does it solve?The way we approach vendor risk management today is built around the concept of asking questions through questionnaires.  The questionnaires are almost always a "one off" for each organization, which brings with them all the…

MFA Factors: Knowledge

In the previous post we level set and I discussed how the CISA has classified "single" factor authentication (aka passwords alone) as a bad practice.  We also reviewed at a high level what MFA is and the major components that…

MFA: Types of factors

Recently CISA moved the use of a single factor (password for instance) into the category of "bad practices".  Listen, its time!  You should be adopting multifactor authentication (MFA) for everything.  CISA moving 1FA onto the naughty list just made it…

Types of security frameworks

If you are here, reading this than I can assume you have questions.  Maybe you have just started your search and stumbled across this article, but it’s also just as likely you have been searching for a while and…

The New CISO: What type of CISO are you?

Let me share a story with you...Picture this, an “executive” level meeting is called at a medium sized organization.  The invitation included the CEO, CFO, CISO, COO, VP of IT, a Sr. Engineer from the technical team & the…

The new CISO series: 3rd party risk

As a new CISO, even as an established CISO, you will always have to review and keep current your 3rd party & vendor risk assessments.  These 3rd parties must offer a critical component to your organization, otherwise why do they…

Do these 3 things today to level up your Security skills

I won't dilly dally, that's the point of this article...But I do want you to know where these ideas came from, it’s important to understand that these are not just pulled out of thin air.  Instead, these are…