7 items with this tag.
Strategic insights on information security, cybersecurity governance, and risk management
Sten Eikrem - Information Security & Cybersecurity Governance | Risk Management | IT/OT Security in Manufacturing
Practical implementation guide for seven-layer defence architecture. Specific technologies, vendors, and integration strategies for enterprise security teams designing for WAF failure.
WAFs fail to block 52% of exploits. This isn't a vendor problem - it's a fundamental limitation of signature-based perimeter defence. Strategic framework for enterprise security leaders.
Most security governance is theater - committees that rubber-stamp, decisions that decide nothing, metrics that measure activity not outcomes. Here's how to build governance that actually works.
What if the hardest root causes to analyze are those buried in risk decisions we never understood we were making? Most cybersecurity incidents trace back to implicit risk acceptances hidden in everyday business choices.
Strategic advice for cyber insurance renewals - threshold-based IR coverage, pre-approved suppliers, and maximising preventative services