Remove how-to-ask-questions-to-succeed-with-security-projects
article thumbnail

How to Ask Questions to Succeed with Security Projects

Lenny Zeltser

No matter the years of experience in cybersecurity, security professionals are often in situations where crucial details are missing. Yet, we often hesitate to ask questions because we don't want to appear ignorant or don't know what to ask. I also presented on this topic at RSA Conference.

article thumbnail

Three Ways CISOs Can Drive More Meaningful Collaboration

Lenny Zeltser

This involves aligning our efforts with business objectives and collaborating with colleagues who are not experts in IT or security. The research highlighted the need for security leaders to establish partnerships with top executives in sales, finance, and marketing. For example, asking, “What do you think?”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Web Data for Actionable Insights

Import.IO

Answering these questions can save you the pain of hard-earned web data collection that doesn’t get used operationally. Keeping key success factors simple and clear prevents scope creep before and after your web data project launch. Web data is ready to provide you with insights if only you know what questions to ask.

article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

She talks about the various ways criminal hackers hide their work, what happens after ransomware hits on a system, how investigators go about looking for recovery information, and what type of skills those practitioners need t o succeed. But how does something like that map to the digital world?

article thumbnail

Using Information Governance with a Privacy Compliance Plan as the Fulcrum for Data Privacy and Continuous Compliance

Information Governance Perspectives

The usual checkbox compliance, ad-hoc governance, and reactive information security policies will fail, if they haven’t already, and create too much organizational risk. To provide these things, you must build a strong information governance framework and privacy compliance plan to succeed. People tend to forget that.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

In fact, I remember starting a new job by flying to Auburn Hills, Michigan for the very first meeting of the Featherstone Group, a collection of automotive OEM executive and security professionals. Steve Grobman, CTO with Intel’s security group had this to say: CNBC: Yeah, so I think that nothing is ever impossible.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Welcome to The Hacker Mind, an original podcast from for all secure. With digital convenience there’s often a price. And if that means a bad actor can create a wireless key for your new Tesla, that price is pretty steep. But in the early 2000s, that was starting to give away to key fobs. So the car would start. It wasn't very robust.