Greetings. Thank you for visiting this blog. You will find insights and information from my professional experience working on complex technology and cyber security challenges at many of the World’s most brand recognized companies. I’m just getting started so please bookmark this blog and check back regularly.
Topics covered will include, but not necessarily be limited to the following:
- Cyber Strategy & Governance
- CISO road map and Business Objectives
- Risk Management, Business Resiliency
- Compliance
- Identity & Access Management
- Cyber Security Architecture
- Application Security and Secure DevOps
- End Point Security
- Network Security
- Data Security
- Privacy
- Infrastructure and Data Center Security
- Security Operations & Incident Response
- …