Securing the supply chain...

Today most organisations rely on number of suppliers for providing services to their customers. Supply chain plays a key role within an organisation allowing them to innovate, create new products or services, increase their profitability and compete with

Talented Team

This is the third blog post as part of the series “How to Run an Information Security Function Effectively?” In my first post, I provided the mind map describing the thought process behind my conclusion that we can be much more successful

Something to offer (Servi...

This is the second blog post as part of the series “How to Run an Information Security Function Effectively?” In my first post, I provided the mind map describing the thought process behind my conclusion that we can be much more

July 24, 2013

How to run an Information Security Function effectively?

It’s an exciting experience when you get your first leadership role to build, run and manage a function, whether it’s an IT function or an Information Security function. You want to do a good job, make a good

June 24, 2013

Clueless Board or Inarticulate CISO

There was an article published by Forbes “Boards are still clueless about cybersecurity” on 16-May-2012 based on the report, The Governance of Enterprise Security: CyLab 2012 Report, published by Carnegie Mellon CyLab and RSA. This report was based on the responses from 108 respondents

June 4, 2013

What is Risk Appetite?

Governance, Risk and Compliance (GRC) sounds quite a complicated subject to a number of people. I felt the same way when I started my career in this exciting field of Security & Risk. I thought it will be

Full Blog