Dear CEO are you enabling your CISO?

,
Managing risk is at the forefront of responsibilities that C-level executives deal with on a daily basis. Yet, it would seem that many executive committees are still ignorant of security risk due to a lack of understanding or an unwillingness…

Awareness revisited – overcoming those hurdles

,
Taking into account the traditional critical success factors of security awareness may not be enough to create a security aware environment. There are a number of hurdles that still make you fail. So how can we overcome those? This post first…

Six reasons why awareness programs fail even when following best practices

,
Taking into account the traditional critical success factors of security awareness may not be enough to create a security aware environment.  This post first appeared on CSO Online on October 24, 2017. We still have some way to go, however…

Security Process Sample: Security Awareness

, ,
As indicated in prior posts, I am working on a Security Process Reference Model. Given that October is Cybersecurity Awareness Month, I thought it would be ideal to release a sample of the awareness processes. The Security Process Reference…

Common pitfalls in documenting your business processes

,
I am currently developing a security process reference model. This got me thinking about two important questions that often come up when it comes to process modelling and process documentation: Why should you document your processes? Basically,…

Benefits and added value of business process modelling

,
I am currently developing a security process reference model. This got me thinking about two important questions that often come up when it comes to process modelling and process documentation in general: Why should you document your processes?…

ICC Commission on Digital Economy publishes Cyber Security Guide for Business

Today the International Chamber of Commerce (ICC) Commission on Digital Economy published a global Cyber Security Guide for Business. This guide from ICC Global was inspired by the Belgian Cyber security guide, an initiative of ICC Belgium and…

ICC Belgium and VBO publish Belgian Cyber Security Guide, and I helped writing it

On November 28 the first Belgian Cyber Security Guide was launched. The development of this guide was a joint effort between ICC Belgium, VBO-FEB, EY, Microsoft, LSEC, ISACA Belgium and the B-CCENTRE. It provides practical guidelines to secure…

Sociale media – vele opportuniteiten maar ook risico’s [Dutch]

, ,
Het aantal internetgebruikers en het aantal gebruikers van sociale media blijven een sterke groei kennen, en zijn haast niet meer uit het bedrijfsleven weg te denken. Naast tal van mogelijkheden en uitdagingen, brengt dat ook een aantal gevaren…

Telecoms: Security starts internally, but may become a revenue generator

Information security issues are multiplying as security threats are on the rise and operators are moving into new services and technologies that bring with them additional vulnerabilities. In this article we explore the information security issues operators are facing, but also how operators can turn these into an opportunity for differentiating themselves in the market and even generating new revenues.