
Category: InfoSec


BlueVoyant: 7 Experts On Evaluating And Managing Supply Chain Risk
Posted by Mighty Guides | Aug 31, 2020

BlueVoyant: 7 Experts on Evaluating and Managing Cyber Risk for Investors
Posted by Mighty Guides | Aug 31, 2020

Venafi: 8 Experts on Protecting Machine Identities
Posted by Mighty Guides | Jun 7, 2020

BlueVoyant: How to Build a World-Class Cyber Security Practice
Posted by Mighty Guides | Feb 17, 2020

BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
Posted by Mighty Guides | Jul 29, 2019
Are you a Security expert? Participate in a Mighty Guide.
Featured Experts


Matthew Otwell: Identify Deficiencies That Exist
Nov 9, 2020



Dmitriy Sokolovskiy: Expand Your Visibility
Nov 8, 2020



























Daniel Paula: Ending and Preventing Breaches
Jul 29, 2019

Tad Dickie: Threat Hunting and Incident Response
Jul 29, 2019


Brian Shea: The MSSP Tech Stack
Jul 29, 2019

Rachel Guinto: When to Leverage an MSSP
Jul 29, 2019






James Carder: Automation and Correlation are Key
May 10, 2019




Mauro Loda: Cloud and Container Security Series
Apr 15, 2019

Ross Young: Cloud and Container Security Series
Apr 15, 2019

Darrell Shack: Cloud and Container Security Series
Apr 15, 2019

Paul Dackiewicz: Cloud and Container Security Series
Apr 15, 2019

Katherine Riley: Cloud and Container Security Series
Apr 15, 2019




Dr. Rebecca Wynn: Take The Time To Train Your Tools
Oct 18, 2018



























































Adam Ely: Choose Security Metrics That Tell a Story
Aug 19, 2018















Mark Weatherford: Long-Term Goals Guide CDM Success
Jul 24, 2018

Renee Forney: The Right Resources Ensure CDM Success
Jul 24, 2018

Luis Brown: Frameworks Need to Adapt
Jul 19, 2018







Kalpesh Doshi: A Framework Is a Foundation
Jul 19, 2018
















Nir Yizhak: Framework as an Instrument of Change
Jul 18, 2018












































































Hemanta Swain: Quick Response Is the Key
Jul 9, 2018









Featured Articles
- Brian Bobo, CISO, Sun Country Airlines, To Minimize Noise, You Need To Select The Right Tools >>
- Bruce Phillips, SVP & CISO, Williston Financial Group, Security Automation Begins With A Process >>
- Don Welch, Chief Information Security Officer, Penn State University, Security Automation Requires Different Skills >>
- Dr. Rebecca Wynn, Head of Information Security & Data Protection Officer, Matrix Medical Network, Take The Time To Train Your Tools >>
- Sijmen Ruwhof, Freelance IT Security Consultant / Ethical Hacker, Secundity, Automation Tools Need To Be Tuned To Risk Scenarios >>
- Slim Trabelsi, Senior Security Architect, SAP, Correlating Security Data From Multiple Sources Requires Deep Learning Tools >>
- Steve Stonebraker, Principal Security Architect, Guaranteed Rate, Security Automation Begins With Visibility >>
- Daniel Newsome, Senior Web Architect, Zonar Systems, Work Incrementally, and Take Full Advantage of Cloud-Native Tools >>
- Dan Bowden, VP & CISO, Sentara Healthcare, Bake as Much into the DevOps Process as Possible >>
- Kevin Price, Principal Infrastructure Engineer- Information Security, GE Appliances, a Haier Company, Select Security Tools that Work in an Automated DevOps Workflow >>
- Levi Blackstone, Software Developer IV, Rackspace, A Cloud-Native Environment Enables More Granular Defense in Depth >>
- Nuwan Bandara, Director – Solutions Architecture, WSO2, When Architecting a Cloud-Native App, Think about End-to-End Security >>
- Marcelo Grebois, Infrastructure Developer, Telefónica NEXT, Developers Need to Learn More about Security >>
- William Caban, DevOps Technical Solutions Architect, Global Cloud and Automation Team, World Wide Technology, Cloud-Native Requires Rethinking Traditional App Development >>
- Rebecca Wynn, Head of Information Security & Data Protection Officer, Senior Director, Matrix Medical Network: ‘Set and Forget’ Is Lazy Security >>
- Joseph Smith, Interim Director of Information Technology, University of Maryland Eastern Shore: A Security Practice Needs to Demonstrate Continuous Improvement >>
- Todd Spight, Chief Information Officer, Columbia College Chicago: A Security Practice Needs to Demonstrate Continuous Improvement >>
- Katrina Biscay, Director of Information Security, University of Cincinnati: Broaden the Analytical Skills within Your SOC >>
- Hemanta Swain, Sr. Director & Information Security Officer, TiVo: Quick Response Is the Key >>
- Paul Heffernan, Group Chief Information Security Officer, Unipart Group: Moving from File Locking to Behavior Locking >>
- Kevin McLaughlin, Director – Deputy CISO and a Professor, Stryker: Bimodality and Digitization Can Help You Detect the Unknown Threat >>
- Steve Stonebraker, Principal Security Architect, Guaranteed Rate: To Secure Endpoints, You Need a Complete View of Threats >>
- Lester Godsey, Chief Information Security Officer, City of Mesa: More Data Makes the Behavioral Analysis More Accurate >>
- Jason Kinder, Director, Corporate Security – Cyber Security & SOC Operations, DRS Technologies, Inc.: Active Threat Management Requires New Tools and Skills >>
- Nick Green, Senior Director Information Security for EMEA/APAC, Ticketmaster, In a Large Organization, Know the Risk Owners and Adapt to Their Needs >>
- Pieter VanIperen, Senior Architect, Automation, Advanced Integration, Security, TD Ameritrade, Risk Assessment and Prioritization is a Triage Process >>
- Jayesh Kalro, Security Architect, CA Technologies, To Manage Vulnerabilities Effectively, Define Business Priorities and Identify Critical Assets >>
- Juan Morales, Senior Director, Global Information Security – Cyber Security & Incident Response, Realogy Holdings Corp., Focus First on Assets That Keep The Business Running >>
- John Trujillo, Technology Leader and Information Security Officer, Pacific Life Insurance Company, You Must Understand the Business Function of Digital Assets >>
- Surinder Lall, Senior Director Information Security, Viacom / Paramount Pictures, The Key To Risk Prioritization is Risk Assessment >>
- Bobby Adams, Sr. Security Architect, Advanced Technology & Enterprise Architecture, TD Ameritrade, A Holistic, Enterprise-Wide Strategy is Essential >>