About the author:

The author is a practicing cyber security manager with 15 years' industry experience. Over the course of his career he has worked across various cyber specialisms, including security operations, penetration testing, enterprise security architecture, risk management, strategy development and program management. He has spent the last several years managing cyber teams and currently leads a team of security specialists at a public utilities company.

These are his musings.

Contact: cisothoughts at outlook dot com 

Popular posts from this blog

The Limitations of Cyber Risk Assessment Tools

Defining Cyber Risk

The Pitfalls of Cyber Risk Assessment