January 8, 2018

Most of my CISO assignments have been transformative roles.  I've usually been called in when the company is in crisis or to replace a CISO that has been let go for some specified reason.  When this occurs, my first priority is to ensure that the business understands t...

October 23, 2017

A few years ago a good friend of mine and longtime CISO left the chair to become the chief security strategist at a well-known security technologies company. A few weeks after that transition, my buddy and I sat down for a long overdue dinner with some friends. During...

October 9, 2017

Several weeks ago I sat down with my good friend Jill to discuss security and the security profession.  Jill doesn't come from our world yet she has a keen and sincere interest in what we do.

After a half hour or so of discussion Jill asked me a question that no one els...

October 5, 2017

In the wake of the Equifax breach, I have found myself on an increasing number of calls with reporters and business leaders from various industries.  Invariably, the questions asked all boil down to one overarching interrogative:  "How do we avoid becoming the next bre...

September 18, 2017

I am not going to talk about the Equifax breach. I know nothing more about the breach than what has been reported via numerous media outlets and commented on by ‘experts’ of various pedigrees.

Instead, I think it’s important to spend a few moments discussing the abrupt...

August 9, 2017

Recently I and several other cybersecurity professionals were asked, "What does it take to become a cybersecurity superhero?"  Interestingly enough, there was a goodly amount of consensus around the answers.  

To hear our thoughts, give this article a read.  Enjoy!

April 20, 2017

I usually don't use this blog to comment on security "current events;" there are enough pundits and prognosticators out there already that one more voice isn't needed.  Still, the recent events at Tanium do merit a word or two.

For those of you unfamiliar with the compa...

April 18, 2017

My son Scott turns 23 today. As I watch him making his way into the world I am endlessly proud of the truly kind, generous, and scary-smart Man that he has become. 


As I sat thinking about his birthday, I realized that my son represents the first generation raised...

April 11, 2017

In my new role, I regularly speak with business leaders and senior cyber professionals about the next generation of cyber warriors and what skills they will need to succeed. Ironically, most forward-looking professionals are not focusing on the technical prowess and sk...

February 10, 2017

Pop quiz today!  

Which of the following situations is a violation of privacy: 

A national retailer utilizes purchases you make with them to send you advertisements about products you might enjoy or need.

A reputable search engine utilizes data about you from previous se...

Please reload

About the Author

Kim Jones is a 30-year information security and risk management professional with experience in the financial services, defense, healthcare, and manufacturing sectors

Popular Posts

A Three-Pronged Approach to Protection

October 5, 2017

1/4
Please reload

Recent Posts

January 8, 2018

October 23, 2017

October 9, 2017

April 20, 2017

April 18, 2017

Please reload

Search By Tags
Please reload

Connect
  • LinkedIn Social Icon
  • LinkedIn Social Icon

© 2023 by Kim L. Jones.  All rights reserved.  Proudly created with Wix.com