Remove how-to-ask-questions-to-succeed-with-security-projects
article thumbnail

How to Ask Questions to Succeed with Security Projects

Lenny Zeltser

No matter the years of experience in cybersecurity, security professionals are often in situations where crucial details are missing. Yet, we often hesitate to ask questions because we don't want to appear ignorant or don't know what to ask. I also presented on this topic at RSA Conference.

article thumbnail

Three Ways CISOs Can Drive More Meaningful Collaboration

Lenny Zeltser

This involves aligning our efforts with business objectives and collaborating with colleagues who are not experts in IT or security. The research highlighted the need for security leaders to establish partnerships with top executives in sales, finance, and marketing. For example, asking, “What do you think?”

CISO 57
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using ChatGPT to Become Irresistible to Hiring Managers

SecureWorld News

Jason Dion and I have documented all those things in our "Your Cyber Path" podcast episodes and in our Udemy course, "IRRESISTIBLE: How to Land Your Dream Cybersecurity Position." I used ChatGPT to figure out how you can get better more quickly at each major step in the job hunting process. I will ask you a series of questions.

article thumbnail

Be you in the (cyber) workplace

Jane Frankland

Women are frequently set up for failure, whether that’s when they start a new position, take on a new project, or in leadership – otherwise known as the glass cliff. “She’s TOO soft” “She complains TOO much” “She asks TOO many questions” As well as, “She’s not confident ENOUGH”.

Education 130
article thumbnail

Industrial cybersecurity: know the biases that can derail collaboration between OT and IT

Cisco Security

Neither team can succeed alone. In this blog I’ll explain these misunderstandings and how to overcome them to protect industrial networks. In their view, OT cybersecurity can be added early when designing an industrial project and managed in the same way as safety or reliability. Make it a priority to train every ICS engineer.

article thumbnail

3yrs of CAA ASSURE assessments. What we’ve learned

Pen Test Partners

It demands context, justification, and understanding of the requirements and how to meet them. TL;DR This is not a cheat sheet for CAA ASSURE compliance It is a guide on how to ensure a smooth journey to CAA ASSURE compliance We’ve included handy hints and tips we’ve found along the way How to prepare for an audit Not ready?

article thumbnail

Creating a Vulnerability Management Program – Penetration Testing: Valuable and Complicated

NopSec

Or they may simply wish to meet security standards established by such bodies as the National Institute of Standards and Technology (NIST) and the Center for Internet Security (CIS). Pentesting is a long-established method of independently verifying an organization’s ability to detect and defend against attacks.