kljgamer1Jan 8, 20181 minTransforming SecurityMost of my CISO assignments have been transformative roles. I've usually been called in when the company is in crisis or to replace a CI...
kljgamer1Oct 23, 20176 minVendor KabukiA few years ago a good friend of mine and longtime CISO left the chair to become the chief security strategist at a well-known security t...
kljgamer1Oct 9, 20173 minWhy Do You Do It?Several weeks ago I sat down with my good friend Jill to discuss security and the security profession. Jill doesn't come from our world ...
kljgamer1Oct 5, 20173 minA Three-Pronged Approach to ProtectionIn the wake of the Equifax breach, I have found myself on an increasing number of calls with reporters and business leaders from various ...
kljgamer1Sep 18, 20173 minSecurity Diversity in the Age of EquifaxI am not going to talk about the Equifax breach. I know nothing more about the breach than what has been reported via numerous media outl...
kljgamer1Aug 9, 20171 minHow to Be a Cybersecurity SuperheroRecently I and several other cybersecurity professionals were asked, "What does it take to become a cybersecurity superhero?" Interestin...
kljgamer1Apr 20, 20172 minA Matter of TrustI usually don't use this blog to comment on security "current events;" there are enough pundits and prognosticators out there already tha...
kljgamer1Apr 18, 20172 minGrowing Up SecureMy son Scott turns 23 today. As I watch him making his way into the world I am endlessly proud of the truly kind, generous, and scary-sma...
kljgamer1Apr 11, 20173 minRandom Thoughts on Critical ThinkingIn my new role, I regularly speak with business leaders and senior cyber professionals about the next generation of cyber warriors and wh...
kljgamer1Feb 10, 20174 minThe Impact of Situational PrivacyPop quiz today! Which of the following situations is a violation of privacy: A national retailer utilizes purchases you make with them to...
kljgamer1Feb 5, 20172 minIs It Really "All About The Data?"As we look back on 2016, we are once again faced with a plethora of data breaches which resulted in the exposure of hundreds of millions ...
kljgamer1Jan 27, 20177 minBuilding Security Warrior 2.0I’ve had the privilege through most of my career to have known some very smart and thought-leading people. These people regularly push me...
kljgamer1Jan 23, 20173 minUnderstanding the BusinessSecurity professionals have preached for some time about the importance of understanding the business when constructing a security progra...
kljgamer1Jan 17, 20171 minPrivacy...Simplified"Explain it to me like I'm a 6 year old." I first heard this line spoken by Denzel Washington in the 1993 movie Philadelphia . Since the...
kljgamer1Jan 10, 20173 minAsking the Right Questions about Russian HackingBack in my GI days I participated in an intelligence exercise designed to simulate how we would go about defining and gathering informati...
kljgamer1Jan 4, 20172 minIn Defense of IntelligenceOver the past few weeks there has been a bit of a dust-up regarding the reliability of analysis and information originating from our nati...
kljgamer1Nov 20, 20161 minThe Future of CybersecurityJim Routh is one of our industry's visionary leaders. I always enjoy listening to him and his vision of the direction of our profession....
kljgamer1Nov 16, 20163 minCybersecurity and the Board of DirectorsOver the past three weeks I’ve had occasion to attend three separate events all focusing on cybersecurity and the Board of Directors (BoD...
kljgamer1Sep 27, 20156 minSpeaking the "Language of Security"Recently, I've come across a spate of articles discussing the need for security professionals to "speak the language of the business." T...
kljgamer1Jun 8, 20156 minSecurity IPBFor the past 6 weeks I have been listening to the rumbles and fallout of the RSA conference… …no, that’s not quite correct. It’s not been...