JD

BYOC - Bring your own Coffee Virtual Events Cybersecurity Cloud Sustainability Inclusions Accessibility Leadership

BYOC – Bring your own Coffee Virtual Events

BYOC – Bring your own Coffee Virtual Events is back and Leadership Circle by Spearhead Management is proud to partner with our founder Dr. ir Johannes Drooghaag for the 2022 edition of Bring your own Coffee Virtual Events! Join the conversation and contribute to the discussions on essential topics. March 2022 – How secure is …

BYOC – Bring your own Coffee Virtual Events Read More »

The largest risk in Cyber Security is a false sense of safety. The largest threat in Cyber Security are those who create a false sense of safety.

The largest threat in Cyber Security are those who create a false sense of safety.

The largest risk in Cyber Security is a false sense of safety. The largest threat in Cyber Security are those who create a false sense of safety. There are a lot of false narrative related to cybersecurity, and unless you are having the required digital skills to evaluate them all, it can be quite challenging …

The largest threat in Cyber Security are those who create a false sense of safety. Read More »

Using systems beyond End-of-Life is a significant cyber risk.

Using systems beyond End-of-Life is a significant cyber risk.

Using systems beyond End-of-Life is a significant cyber risk. Almost everyone who has been or is in a role with responsibility for IT has been in a situation where devices or operating systems had reached their end-of-life, but there were logical explanations why it would make sense to keep using them. Other priorities, budget restrictions, …

Using systems beyond End-of-Life is a significant cyber risk. Read More »

A cyber incident will happen. Plan and prepare accordingly!

A cyber incident will happen. Plan and prepare accordingly!

A cyber incident will happen. Plan and prepare accordingly! There are two phases in a cyber incident that influence the duration and impact. First there is of course the type of attack and how sophisticated it is. Although we must do everything possible to prevent a cyber incident, it is hardly possible to guarantee that …

A cyber incident will happen. Plan and prepare accordingly! Read More »

Great leaders have kindness, gratitude and humility in common. That is why they speak about the accomplishments of their teams.

Great leaders have kindness, gratitude and humility in common.

Great leaders have kindness, gratitude and humility in common. That is why they speak about the accomplishments of their teams. The best way to learn about the values of a leaders is to pay attention to the way they communicate during successes and failures. Great leaders have in common that they appraise their team for …

Great leaders have kindness, gratitude and humility in common. Read More »

People who say you can do everything you want when you want it enough haven’t dealt with real problems.

People who say you can do everything you want when you want it enough haven’t dealt with real problems.

People who say you can do everything you want when you want it enough haven’t dealt with real problems. It is easy to say that you can achieve anything you want when you want it enough, but it is also far from realistic. There are many situations where the circumstances are stacked against whatever it …

People who say you can do everything you want when you want it enough haven’t dealt with real problems. Read More »

Nothing is particularly hard if you divide it into small jobs.

Nothing is particularly hard if you divide it into small jobs.

Nothing is particularly hard if you divide it into small jobs. – Henry Ford One major challenge when trying to find solutions is being able to divide the problem at hand into logical and understandable steps. Not only is this essential to increase the chances of solving the problem, according to Henry Ford it even …

Nothing is particularly hard if you divide it into small jobs. Read More »

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation!

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation!

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation! Our study The Human Element in Cybersecurity shows that abandoned technology is by far the largest root cause of cybersecurity incidents. And a significant part of abandoned technology is unpatched vulnerabilities. Vulnerabilities in applications, firmware, operating systems, drivers, …

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation! Read More »