Remove a-4-step-process-to-achieve-true-cybersecurity-success
article thumbnail

Presenting the Security Outcomes Study, Volume 2

Cisco Security

What if you could build a successful, world-class security program with just five practices? . Our latest cybersecurity research study suggests that this is not only true but is also a tangible reality for organizations that choose to follow some practical steps. 5,100+ IT and cybersecurity pros chart the way forward

article thumbnail

6 Valuable lessons I won’t forget from 2020, the progress I made, & me bearing my soul…

Jane Frankland

To process my everyday living. I have by no way worked it all out, but as Margaret Wheatley said, “Without reflection, we go blindly on our way, creating more unintended consequences, and failing to achieve anything useful.” Every year, around this time, I start to reflect. Chances are, you do too. This time is cherished.

CISO 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

13 Steps to Take if You’ve Been Laid Off in Cybersecurity (which everyone should read)

Jane Frankland

The past couple of years has seen remote work leveling the playing field in terms of women in cybersecurity. But as I wrote, and created this blog and assets, I realised much of the advice wasn’t just for people who were being laid off. If you haven’t been, please cherry pick your way through the steps and assets. #1

article thumbnail

12 Steps to Take if You’ve Been Laid Off in Cybersecurity (which everyone should read)

Jane Frankland

The past couple of years has seen remote work leveling the playing field in terms of women in cybersecurity. But as I wrote, and created this blog and assets, I realised much of the advice wasn’t just for people who were being laid off. If you haven’t been, please cherry pick your way through the steps and assets. #1