A quick intro
My blog here is all about connecting boards and cyber security leaders together. It talks about what I’ve learned (and am still learning) about the challenge of aligning technical delivery to business goals and outcomes, and how this can be achieved.
Everything I write on this site is focussed on security management and leadership; it’s suitable for board directors and NEDs, executives, operational leaders, CISOs, and cyber security professionals.
There’s loads of technical cyber security information out there but not so much for leaders and aspiring leaders; this is my attempt to help address that.
Please bear in mind that this site is a spare-time experiment; it may come and go like a ghost in the wires. So expect nothing and be positively surprised.
If you like, you can connect with me on Medium, Linkedin and Twitter. Or stop by, leave a comment, and say hello. I’d love to know if this was useful to you, otherwise I’m just talking to myself ;-)
Please note: all views and comments on this site and social media are personal and do not represent any other individual or organisation. Reasonable efforts are made to ensure accuracy but this cannot be guaranteed.
Comment by Matt Palmer on…
- Artificial Intelligence 3
- Boards & Governance 3
- Careers 11
- Cloud Computing 1
- Comment 1
- Cyber Security 9
- Cyber Security Assurance 2
- Cyber Security Management 3
- Leadership 3
- National Cyber Security & Resilience 4
- Non Executive Directors 2
- Post Incident Reviews 3
- Projects and Change 3
- Risk Management 1
What really is cyber security and why doesn't the traditional CIA triad of confidentiality, integrity, and availability work?
And what's that got to do with footballs anyway?
I've written this simple breakdown of the five key cyber security terms - confidentiality, integrity, availability, authenticity and non-repudiation - with examples of what they mean in practice, and real life incidents illustrating what happens when they go wrong!