The Business of Security

Published On: December 22, 2016

December 21, 2016

The original ideation leader behind TrustMAPP, Chad Boeckmann (@cboeckm), was recently asked to be a guest on the podcast “Down the Security Rabbit Hole” with Rafal Los (@wh1t3rabbit), James Jardine (@jardinesoftware), and Michael Santarcangelo (@catalyst) on the subject “The Business of Security“.  In this podcast the crew discusses trends in information security management over the past several years and how leadership infosec teams are getting things done and also struggling to tell a compelling message. While the “bad guys” are running their criminal enterprise, security teams have struggled to be business-relevant. This discussion starts to dive into how to align security and business goals, answering the “how much is enough?” question and more:

  • How we as an industry are just beginning to transcend beyond IT and point-in-time compliance to a more formal basis for measuring progress
  • Leadership in security and formal training
  • How to brief the board and focus on telling a compelling business story
  • And much more! Take a listen here!



Browse These Topics


automate and visualize information security risk management better understanding of their information security management boost the confidence of board members boost the protection of your data bridge the gap in your information security challenges create a security roadmap cyber attack Cyber defense experts cyber security cyber security goals Cybersecurity management developing security programs across the business Easy to Understand Data Security Solution effective cyber security software Effective Data Security Measures effectively communicate with board members regarding cyber issues or threats guide development of a strong information security high quality cyber security tools house being robbed Identify Potential Security Weaknesses Implementing a Comprehensive Cyber Security Plan information security management information security managers information security platform Information Security Programs information security protection agency maintain the control and strength of your firm’s cyber security manage security programs success Managing information security managing your information security effectively professional information security Progressive Data Security Solutions Proposing solutions to cyber threats proprietary software can help you to protect your company reliable information security dashboard responsibilities of a CISO risk assessment software risk management advisor strengthening your company’s security measures strength of your company’s information security strong information security programs successful information security vCISO Visualization of Information Security Risk Management Visualize Information Security Risks