February 5, 2017

As we look back on 2016, we are once again faced with a plethora of data breaches which resulted in the exposure of hundreds of millions of records across this nation, I admit I am left wondering whether or not our data truly has value anymore.

Don't get me wrong:  I st...

January 27, 2017

I’ve had the privilege through most of my career to have known some very smart and thought-leading people. These people regularly push me to the edge of my comfort zone, and make me think about things differently.

Recently, one of these individuals asked me to explain...

January 23, 2017

Security professionals have preached for some time about the importance of understanding the business when constructing a security program.  One of my esteemed colleagues has even been quoted as saying that CISOs should "stop fiddling with the firewalls and go talk to...

January 17, 2017

"Explain it to me like I'm a 6 year old."

I first heard this line spoken by Denzel Washington in the 1993 movie Philadelphia .  Since then, I've adopted and used that line many times in an attempt to get folks to explain complex things in a simpler manner.  Lately I've...

January 10, 2017

Back in my GI days I participated in an intelligence exercise designed to simulate how we would go about defining and gathering information on priority intelligence requirements (PIRs) during peacekeeping operations.  After 3 days of scenario-driven activities, an expe...

January 4, 2017

Over the past few weeks there has been a bit of a dust-up regarding the reliability of analysis and information originating from our nation's intelligence community.  Much of this, in my opinion, is due to attempts to politicize the results of good analysis and judgeme...

November 20, 2016

Jim Routh is one of our industry's visionary leaders.  I always enjoy listening to him and his vision of the direction of our profession.  Recently, I had occasion to discuss Jim his thoughts on the future of cybersecurity; he placed those thoughts in a white paper whi...

November 16, 2016

Over the past three weeks I’ve had occasion to attend three separate events all focusing on cybersecurity and the Board of Directors (BoD).  Two events were multi-day events;  the third was a webinar.  The target audiences for these events varied from current board mem...

September 27, 2015

Recently, I've come across a spate of articles discussing the need for security professionals to "speak the language of the business."  This phrase has been used often to describe the underlying reason that CSOs and CISOs are not considered strategic partners to the bu...

June 8, 2015

For the past 6 weeks I have been listening to the rumbles and fallout of the RSA conference…

…no, that’s not quite correct. It’s not been the fallout from the conference itself, but of the gauntlet thrown by RSA’s new president, Amit Yoran.

In his keynote address, Amit c...

Please reload

About the Author

Kim Jones is a 30-year information security and risk management professional with experience in the financial services, defense, healthcare, and manufacturing sectors

Popular Posts

A Three-Pronged Approach to Protection

October 5, 2017

1/4
Please reload

Recent Posts

January 8, 2018

October 23, 2017

October 9, 2017

April 20, 2017

April 18, 2017

Please reload

Search By Tags
Please reload

Connect
  • LinkedIn Social Icon
  • LinkedIn Social Icon

© 2023 by Kim L. Jones.  All rights reserved.  Proudly created with Wix.com