Product-led, Engineering-led, or Operations-led IT?How we organize our internal IT departments depends upon business values. Three approaches enterprises use are product-led…Apr 15Apr 15
Optimizing your Return on Assessment (ROA)How to use Cybersecurity Assessments to prioritize security initiatives by valueFeb 27Feb 27
Published inProduct Cybersecurity5 Goals for 2024 to Shift Cybersecurity to be Product-ledThese are the 5 Goals for Cybersecurity Leaders you need to complete in 2024 to be product-led in 2025.Dec 19, 2023Dec 19, 2023
Published inProduct Cybersecurity“Secure By Design and Default” in Your Cybersecurity TeamWhat the Three “Secure by Design and Default” Software Product Security Principles Mean for Your Cybersecurity TeamMay 23, 20233May 23, 20233
Published inProduct CybersecurityEmpathy in Cybersecurity, Recognizing “Moments of Truth”Empathizing with Customers, Developers, and StakeholdersApr 12, 2023Apr 12, 2023
Published inProduct Cybersecurity3 Tips for Aligning Business Vision to Cybersecurity StrategyLeaders want measurable data about cybersecurity’s progress toward creating value aligned to the business vision. They do not necessarily…Mar 13, 2023Mar 13, 2023
Published inProduct Cybersecurity5 Reasons Why Product-led Cybersecurity Will Drive Success in 2023Cybersecurity teams need to look into the mirror an ask, “What do I need to do to be prepared for 2023?” Next year I believe cybersecurity…Dec 6, 2022Dec 6, 2022
Published inProduct Cybersecurity‘Defense in Layers’ — Zero Trust Applied to Your Cybersecurity Posture“Defense In Layers” in the EnterpriseNov 29, 20221Nov 29, 20221
Published inProduct Cybersecurity‘Defense in Layers’ — The ExercisePart 2 of the series ‘Defense In Layers’. Link to ‘Defense In Layers’ The Framework. Please support me by following me on Medium.Sep 27, 2022Sep 27, 2022
Published inProduct Cybersecurity‘Defense in Layers’ — The Enterprise FrameworkArticle 1 of ‘Defense In Layers’ in the EnterpriseSep 20, 20221Sep 20, 20221