Cybersecurity

Thought provoking posts on Cybersecurity by Leadership Circle, brought to you by Spearhead Management and Dr. ir Johannes Drooghaag

When Cyber Security is not part of your development plan, you are not developing.

When Cyber Security is not part of your development plan, you are not developing.

When Cyber Security is not part of your development plan, you are not developing. Cybersecurity is not a destination. It is also not something you can buy, or learn in a single event. Cybersecurity is a journey and everyone within the organization must be fully committed to that journey. Training programs and awareness programs are […]

When Cyber Security is not part of your development plan, you are not developing. Read More »

Top Cyber Security Risks

Top Cyber Security Risks

Top Cyber Security Risks:– Abandoned technology– Unpatched vulnerabilities– Misconfiguration– Social Engineering– Stolen/leaked credentials– Insider threats The majority of these risks are not related to users or the technology itself. As The Human Element in Cyber Security clearly shows, the majority of cyber risks and cyber incidents are causes by what we do with technology. More

Top Cyber Security Risks Read More »

Cyber Incidents are rarely caused by technology flaws.

Cyber Incidents are rarely caused by technology flaws.

Cyber Incidents are rarely caused by technology flaws. Browsing the news about critical vulnerabilities and zero-day exploits, on top of the often politically motivated statements about which vendor is a security risk to which nation, we might easily get the impression that technology and flaws in technology are the main cause of cyber incidents. There

Cyber Incidents are rarely caused by technology flaws. Read More »

The pace and complexity of cyber threats and attack vectors continuous to increase exponentially. Conventional thinking will soon be the biggest risk in Cyber Security!

The pace and complexity of cyber threats and attack vectors continuous to increase exponentially.

The pace and complexity of cyber threats and attack vectors continuous to increase exponentially. Conventional thinking will soon be the biggest risk in Cyber Security! There isn’t a day in which we do not learn about a new cyberthreat or attack, and with that we need to keep in mind that not all cyberthreats and

The pace and complexity of cyber threats and attack vectors continuous to increase exponentially. Read More »

Most known Cyber Security Incidents could have been prevented by relatively simple and effective precautions.

Most known Cyber Security Incidents could have been prevented by relatively simple and effective precautions.

Most known Cyber Security Incidents could have been prevented by relatively simple and effective precautions. There are 3 fundamental cybersecurity steps that need to be executed rigidly and without exceptions: Patch Management – ensure that all required patches are distributed and activated in a timely manner Identity and Access Management – ensure that all access

Most known Cyber Security Incidents could have been prevented by relatively simple and effective precautions. Read More »

Focus on external security is not enough. Cyber Security must assume that the infrastructure is already penetrated.

Focus on external security is not enough.

Focus on external security is not enough. Cyber Security must assume that the infrastructure is already penetrated. It is not uncommon that cybercriminals penetrate information infrastructure without actually weaponizing their access immediately. Advanced Persistent Threats (APT) very gradually increase their access and focus on staying undetected. Post Mortem analyzes after APT attacks show that it

Focus on external security is not enough. Read More »

Cyber Security requires a big picture approach in an era where digital transformation is a success enabler. Those who can balance this will win the markets.

Cyber Security requires a big picture approach in an era where digital transformation is a success enabler.

Cyber Security requires a big picture approach in an era where digital transformation is a success enabler. Those who can balance this will win the markets. Digital Transformation creates an unforeseen challenge for many organizations. How can we generate a change management culture that happily embraces changes and at the same time maintain rigid controls

Cyber Security requires a big picture approach in an era where digital transformation is a success enabler. Read More »

Threats and risks continue to change, so should your actions.

Threats and risks continue to change, so should your actions.

Threats and risks continue to change, so should your actions. There isn’t field in which threats evolve as fast as in cybersecurity. Besides a constantly growing number of new threats, there is also the challenge that existing threats keep mutating and get more advanced. In addition to modifying the ways of distribution and attacks, these

Threats and risks continue to change, so should your actions. Read More »