Filter By:
Velocity’s Edge Podcast S1E3 - Melanie Ensign on Strategic Communications
Most organizations think of security communications as ‘crisis management’: what to say when something goes wrong. But waiting until an incident occurs to build relationships, establish trust, and create communication channels severely limits your response options.
Read moreVelocity’s Edge Podcast S1E2 - Huw Rogers on Tech Debt
If you’re leading a profitable, cash-flow-positive business, you’ve probably watched technical debt pile up: those accumulated consequences of choosing quick fixes over well-designed, long-term solutions. If you’re not carefully managing it, it can become overwhelming.
Read moreSelecting a F-CISO, Part III: Making the Decision and Setting Up for Success
This is Part 3 of our series on selecting fractional CISOs. Part 1 and Part 2 covered evaluating experience, program-building skills, cultural change capabilities, and threat response experience. Now we’ll focus on avoiding common pitfalls, making the final decision, and ensuring your F-CISO succeeds.
Read moreSelecting a F-CISO, Part II: Assessing Cultural Change and Threat Response Capabilities
This is Part 2 of our 3-part series on selecting fractional CISOs. In Part 1, we covered evaluating experience and program-building skills. Today, we focus on the harder-to-assess but equally critical capabilities: driving cultural transformation and managing real-world security threats.
Read moreSelecting a F-CISO, Part 1: Evaluating Experience and Program-Building Skills
This is Part 1 of our 3-part series on selecting and managing fractional CISOs. Our previous post explored the strategic rationale for deploying a fractional CISO before hiring your first permanent Chief Information Security Officer. Part 2 covers evaluating experience, program-building skills, cultural change capabilities, and threat response experience.This series provides a comprehensive guide to finding the right change agent for your organization’s security transformation.
Read moreStrategic Deployment of a Fractional CISO
Before hiring their first Chief Information Security Officer (CISO), CEOs and boards should consider a fractional CISO (F-CISO) to build foundational security programs that set the permanent CISO up for success. This strategy addresses a critical disconnect: executives often view security breaches and compliance failures as technical problems, but these business-threatening issues typically stem from cultural and process deficiencies requiring organizational transformation, not just technical expertise.
Read more