Security Leaders Journal


March 24th, 2017 Ed Snodgrass, CISO, Secure Digital Solutions Protecting your organization costs money.  It’s that simple, and there is plenty of noise in the marketplace telling you where to spend it. The amount of money it takes to do so is usually proportional to the size of the proverbial […]

Battle of the Budget






December 21, 2016 The original ideation leader behind TrustMAPP, Chad Boeckmann (@cboeckm), was recently asked to be a guest on the podcast “Down the Security Rabbit Hole” with Rafal Los (@wh1t3rabbit), James Jardine (@jardinesoftware), and Michael Santarcangelo (@catalyst) on the subject “The Business of Security“.  In this podcast the crew discusses trends in information security management […]

The Business of Security





The Problem with Compliance Assessments Newly-minted information security leaders often learn that regulatory or contractual requirements are the primary business driver for their organizations’ security program. Tasked with developing a plan for implementing controls, these leaders turn to compliance assessments to understand the gaps between requirements and operational realities. Ultimately, […]

Where Compliance Assessments Fall Short, Maturity Assessments Rise to the ...


July 22nd, 2016 It is important to understand that information security maturity assessments are unique in outcome and value. Not surprisingly, there is still confusion about the differences between an information security process maturity assessment and the other types of security assessments traditionally employed (namely, risk-, controls- and compliance-focused assessments). We can […]

Information Security Maturity Assessments



Based on our research and a multitude of discussions with CISO’s, Audit Executives and CIO’s our team has identified five common opportunities to improve the information security program. 1. Decision support for information security initiatives 2. Prioritizing resources on the right priorities to effect the greatest improvement 3. Establish meaningful investments across the security program to grow […]

Top 5 Challenges Facing Security Leaders