Benefits for Veterans in Cyber Security and Transferrable Skills

Many veterans leaving the service try to find a way to make their military experience transferable to the civilian sector – something that isn’t always easy. However, one terrific industry to line your skills up with is cyber security. Cyber Security takes its shape from security operations and most security operations in the world stem...

What are Some Benefits for Veterans in Cyber Security?

After two combat deployments to Iraq with the Marines, I knew I wanted to leave the military when my contract was done. Like so many other veterans transitioning out of the service, I wasn’t exactly sure where I belonged in the civilian sector. I had a plan, finish my education, get my career going and...

How Organizations Will Act in 2017 on Their Security Programs

Option 1: Organizations will take the “diet pill” strategy In the year 2017, organizations will be seen taking many shortcuts in the pursuit to do something with their security systems. What most people don’t know is that the security program development process takes a time and is essentially process-based. The main purpose of a security program...

2017: The Year to Build a Repeatable System for Information Security Program Management

It was just in the year 2004 that we had released the CISCO Handbook. The book described the step-by-step methodology for building an effective information security program. When it released, we thought our team would create an information security consultancy to spread the word and help organizations in the practical steps and then we had...

Security Remediation Planning: Tips and Considerations [VIDEO]

“People are spending a lot of money right now on remediation planning, but they are surprised that they are not getting the results they expected.” -Mike Gentile Many organizations plan on how to fix significant amounts of security issues within their organizations. These issues range from large-scale system patches for vulnerable systems to addressing a...

Elements of a Healthy Security Program

Is your Information Security Program a Flip or Flop? Many companies are trying to implement Cyber Security Programs for their organization. An interesting security program element is there is no correlation between spending a lot of money on security technologies, using a well-known consultancy to build a set of security policies for your organization or...

Get the Most Value out of your Penetration Test

These days, there are many reasons for the average emerging growth organizations to conduct a penetration test. It could be a requirement from a potential new customer, as part of a regulatory audit, or to understand the risk profile of your technical environment within a self-driven assessment. At CISOSHARE, our services often become the entire...

How to Secure High Growth Startups

At any high-growth startup or entrepreneurial company, there are many focus areas for the business going on simultaneously; all of which are growing rapidly. People are moving fast: there’s too much to do, and not enough time to do it. In these situations, security often plays a unique role in that everyone now knows it...