The CISO’s Perspective / Special Edition Every once in a while I like to point out one of the teams in the Office of Cybersecurity and present something newsworthy. Today I want to highlight the …
CISO’s Perspective – Cybersecurity Blog
Thought leadership from Bob Turner, UW-Madison Chief Information Security Officer
Now that we know what cybersecurity risk is…
The CISO’s Perspective “It’s not important because it’s policy, its policy because it’s important.” — Gary Declute After working on it for about a year, we are in the end stages of walking the Cybersecurity Risk …
Smart cybersecurity plans balance vision and agility
The CISO’s Perspective There’s an inherent dilemma in effectively managing cybersecurity: IT organizations must dedicate the time and focus required for long-term strategic planning while maintaining the agility to meet evolving threats and take advantage …
The CISO’s Perspective – Beyond security and privacy: the ethical use of data
This is a re-run of an article I wrote for Security Current which was based on a presentation I delivered at the IQPC Cybersecurity in Higher Education Conference in March of this year. As the …
The CISO’s perspective: Advanced threat protection!
Remember when you received a gift you had hoped for, asked for, badgered your parents for? How about that feeling of accomplishment you had for the day or so after you unwrapped it? The Cybersecurity …
The CISO’s Perspective: Sun Tzu and the art of cyberwar
It’s been nearly a year since my wife and I bought our home in the Village of Oregon, Wisconsin. Methodically, room by room, she has been decorating and furnishing rooms with my home office being …
The CISO’s Perspective: Managing cybersecurity risk
June 21, 2016 Inside cybersecurity circles and in some IT and Policy forums we have been talking about developing a Risk Management Framework, or RMF, for many months. I am happy to announce we are …
The CISO’s Perspective
This marks my first public blog post about the University of Wisconsin – Madison’s approach to securing our IT infrastructure to promote the availability of systems and data, ensure the integrity of computing operations and …