The CISO’s Perspective / Special Edition Every once in a while I like to point out one of the teams in the Office of Cybersecurity and present something newsworthy. Today I want to highlight the …
CIO Blog
A collection of Lois Brooks’ presentations, writings, and thoughts on leadership
Now that we know what cybersecurity risk is…
The CISO’s Perspective “It’s not important because it’s policy, its policy because it’s important.” — Gary Declute After working on it for about a year, we are in the end stages of walking the Cybersecurity Risk …
Smart cybersecurity plans balance vision and agility
The CISO’s Perspective There’s an inherent dilemma in effectively managing cybersecurity: IT organizations must dedicate the time and focus required for long-term strategic planning while maintaining the agility to meet evolving threats and take advantage …
The CISO’s Perspective – Beyond security and privacy: the ethical use of data
This is a re-run of an article I wrote for Security Current which was based on a presentation I delivered at the IQPC Cybersecurity in Higher Education Conference in March of this year. As the …
The CISO’s perspective: Advanced threat protection!
Remember when you received a gift you had hoped for, asked for, badgered your parents for? How about that feeling of accomplishment you had for the day or so after you unwrapped it? The Cybersecurity …
The CISO’s Perspective: Sun Tzu and the art of cyberwar
It’s been nearly a year since my wife and I bought our home in the Village of Oregon, Wisconsin. Methodically, room by room, she has been decorating and furnishing rooms with my home office being …
The CISO’s Perspective: Managing cybersecurity risk
June 21, 2016 Inside cybersecurity circles and in some IT and Policy forums we have been talking about developing a Risk Management Framework, or RMF, for many months. I am happy to announce we are …
The CISO’s Perspective
This marks my first public blog post about the University of Wisconsin – Madison’s approach to securing our IT infrastructure to promote the availability of systems and data, ensure the integrity of computing operations and …