El Diario del CISO (The CISO Journal) Edición 18 | Page 4

Influencers Dragan Stevanovic IS Consultant at, The complete article is here Nehemiah Security Transforming how organizations secure technology by scientifically measuring #risk, predicting #cyberattack results and stopping advanced #securitythreats. Enterprise Security Architecture - a short overview The CISO Needs To Be A Business Leader More Than A Technical Leader A security architecture is a topic which has been more and more demanded, although stakeholders in organizations may still have quite different views on it and also very different expectations from it. In many cases it is just about solution design that is capable to resolve some security issue, however it also includes strategic views and should drive development of future security capabilities so the organization is capable to deal with recent challenges. As it is obviously quite complex topic, with many dependencies to internal existing processes in organizations, it may be worth to write few observations and clarify further the topic here among security professionals.. Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice would you give them?” . The complete article is here Horst Simon Risk Culture Builder It is time to Think Differently about Risk Management The complete article is here The Future is here! Chiheb Chebbi Works at Not Telling you Hackers How to Attack and defend SCADA systems Hi Peerlysters! Supervisory Control and Data Acquisition (SCADA) systems are playing a huge role in a modern life. This Article will guide you through many important terminologies used when it comes to SCADA system. Later we will discover the most dangerous threats that face those systems in addition to exploring some publicly available tools and resources to attack them. Finally, we will learn how to test a SCADA system using the SCADA Intrusion Detection System Test Framework. If you are still trying to Identify all the risks you are exposed to within the context of your business or spend endless hours converting historic data into useless risk reports in an effort to mitigate as much risk as possible for a green light on the road to taking less risk (for less reward); spending a fortune on controls and the digging of trenches for your lines of “defense”…. Fear no more!. The complete article is here Gary Manley, MA, PMP How do you measure success in Cybersecurity?