• LinkedIn Social Icon

© 2023 by Kim L. Jones.  All rights reserved.  Proudly created with Wix.com

Please reload

Connect

January 8, 2018

Most of my CISO assignments have been transformative roles.  I've usually been called in when the company is in crisis or to replace a CISO that has been let go for some specified reason.  When this occurs, my first priority is to ensure that the business understands t...

October 23, 2017

A few years ago a good friend of mine and longtime CISO left the chair to become the chief security strategist at a well-known security technologies company. A few weeks after that transition, my buddy and I sat down for a long overdue dinner with some friends. During...

October 9, 2017

Several weeks ago I sat down with my good friend Jill to discuss security and the security profession.  Jill doesn't come from our world yet she has a keen and sincere interest in what we do.

After a half hour or so of discussion Jill asked me a question that no one els...

October 5, 2017

In the wake of the Equifax breach, I have found myself on an increasing number of calls with reporters and business leaders from various industries.  Invariably, the questions asked all boil down to one overarching interrogative:  "How do we avoid becoming the next bre...

September 18, 2017

I am not going to talk about the Equifax breach. I know nothing more about the breach than what has been reported via numerous media outlets and commented on by ‘experts’ of various pedigrees.

Instead, I think it’s important to spend a few moments discussing the abrupt...

August 9, 2017

Recently I and several other cybersecurity professionals were asked, "What does it take to become a cybersecurity superhero?"  Interestingly enough, there was a goodly amount of consensus around the answers.  

To hear our thoughts, give this article a read.  Enjoy!

April 20, 2017

I usually don't use this blog to comment on security "current events;" there are enough pundits and prognosticators out there already that one more voice isn't needed.  Still, the recent events at Tanium do merit a word or two.

For those of you unfamiliar with the compa...

April 18, 2017

My son Scott turns 23 today. As I watch him making his way into the world I am endlessly proud of the truly kind, generous, and scary-smart Man that he has become. 


As I sat thinking about his birthday, I realized that my son represents the first generation raised...

April 11, 2017

In my new role, I regularly speak with business leaders and senior cyber professionals about the next generation of cyber warriors and what skills they will need to succeed. Ironically, most forward-looking professionals are not focusing on the technical prowess and sk...

February 10, 2017

Pop quiz today!  

Which of the following situations is a violation of privacy: 

A national retailer utilizes purchases you make with them to send you advertisements about products you might enjoy or need.

A reputable search engine utilizes data about you from previous se...

Please reload

  • LinkedIn Social Icon

January 8, 2018

October 23, 2017

October 9, 2017

April 20, 2017

April 18, 2017

Please reload

Recent Posts
Search By Tags
Popular Posts

A Three-Pronged Approach to Protection

October 5, 2017

1/4
Please reload

Kim Jones is a 30-year information security and risk management professional with experience in the financial services, defense, healthcare, and manufacturing sectors

About the Author