Security Leaders Journal


June 22nd, 2017  Secure Digital Solutions releases TrustMAPP® version 2.2  to align risk with process maturity. For the first time security and business leaders can gain a comparative view of security maturity associated with identified risks. NEW FEATURES Risk Register, Management and Program Management Overlay Options TrustMAPP® now integrates risk, best practice […]

TrustMAPP® v2.2 Release Aligns Risk with Maturity






May 12th, 2017 Ed Snodgrass, CISO, Secure Digital Solutions Maturity is an interesting word. We’ve heard it throughout our lives and it’s had different meanings in different contexts.  As a kid, we heard it from our parents regarding “growing up” and “being more mature”.  We may not have understood it […]

Why do you measure cybersecurity maturity?









March 24th, 2017 Ed Snodgrass, CISO, Secure Digital Solutions Protecting your organization costs money.  It’s that simple, and there is plenty of noise in the marketplace telling you where to spend it. The amount of money it takes to do so is usually proportional to the size of the proverbial […]

Battle of the Budget






December 21, 2016 The original ideation leader behind TrustMAPP, Chad Boeckmann (@cboeckm), was recently asked to be a guest on the podcast “Down the Security Rabbit Hole” with Rafal Los (@wh1t3rabbit), James Jardine (@jardinesoftware), and Michael Santarcangelo (@catalyst) on the subject “The Business of Security“.  In this podcast the crew discusses trends in information security management […]

The Business of Security





The Problem with Compliance Assessments Newly-minted information security leaders often learn that regulatory or contractual requirements are the primary business driver for their organizations’ security program. Tasked with developing a plan for implementing controls, these leaders turn to compliance assessments to understand the gaps between requirements and operational realities. Ultimately, […]

Where Compliance Assessments Fall Short, Maturity Assessments Rise to the ...



July 22nd, 2016 It is important to understand that information security maturity assessments are unique in outcome and value. Not surprisingly, there is still confusion about the differences between an information security process maturity assessment and the other types of security assessments traditionally employed (namely, risk-, controls- and compliance-focused assessments). We can […]

Information Security Maturity Assessments


Based on our research and a multitude of discussions with CISO’s, Audit Executives and CIO’s our team has identified five common opportunities to improve the information security program. 1. Decision support for information security initiatives 2. Prioritizing resources on the right priorities to effect the greatest improvement 3. Establish meaningful investments across the security program to grow […]

Top 5 Challenges Facing Security Leaders