Subscribe

Archive | BMoS

If your business were a black box machine…

A well-defined business model should clearly articulate your function in the market, including how you make money, what inputs you depend upon, who your target customers are, and what value you are creating for them. It is a structural representation of how your business functions that concisely articulates what opportunities and challenges you will encounter […]

Threat Monitoring

What is Threat Monitoring? The ongoing collection, analysis, and review of attempted and/or successful compromises at the network, platform, data  and process levels. Process Overview The purpose of the Threat Monitoring Process is to standardize and explain the processing activities and steps involved in monitoring threat conditions to organization information assets. Supporting Technologies Network threat […]

Defining Security Strategy

When developing your security strategy, it is important to recognize the limitations on your team. In this case, choosing what to do is often less important than choosing what NOT to do. This deck is used to drive conversation around the choices we make as security practitioners in what we choose to tackle, and what […]

Language of Risk

Why is “The Language of Risk” so important right now?  What are the drivers for Business and Security to speak the same language?  The answer is change: massive, fundamental change in both camps. Technology has moved to center stage as a partner in business enablement, and has brought along its associated risks.  IT and IT […]

Law, Strategy and Competitive Advantage

In the hunt for sources of competitive advantage, scholars have identified opportunities in most business-related disciplines, including marketing, accounting, human resources, and management. Competitive advantage from cross-functional perspectives such as organizational capital, human capital, and global competition have also received vast amounts of scholarly time and attention. The end result has been a cornucopia of […]