Articles by Jim
Activity
29K followers
Licenses & Certifications
-
CSSLP
IC2
Issued -
CISM
ISACA
Issued Expires
Volunteer Experience
Publications
-
Third Party Governance: Digital Identity
ICIT
See publicationThis is for those that want a risk-management approach to third party risk management (TPRM) suitable for today’s attack surface and specific to the software supply chain. Identity management for cloud accounts used in software engineering are essential as a core component of third party risk.
-
The Role of a CISO in Shaping Trust in the Age of Artificial Intelligence
ICIT
See publicationThe Chief Information Security Officer (CISO) plays a vital role in AI governance, balancing risk management with seizing business opportunities. This paper defines the CISO's role in establishing an enterprise-specific AI Governance Framework and offers insights into the challenges and options for effective implementation.
-
Identity as a First Line of Defense
IDS Alliance
See publicationIdentity has evolved as a primary line of defense for cyber security and data science has emerged as a foundational component of digital identity management for an enterprise. Identity and Access Management (IAM) programs tend to lurk in the shadows until something goes wrong. But enterprises now have capabilities that haven’t yet been applied to cybersecurity, and IAM within cybersecurity, fueled by data science fundamentals. Identity is being widely discussed as the next generation of the…
Identity has evolved as a primary line of defense for cyber security and data science has emerged as a foundational component of digital identity management for an enterprise. Identity and Access Management (IAM) programs tend to lurk in the shadows until something goes wrong. But enterprises now have capabilities that haven’t yet been applied to cybersecurity, and IAM within cybersecurity, fueled by data science fundamentals. Identity is being widely discussed as the next generation of the perimeter as businesses transform from legacy-based, on-premises environments to cloud-hosted and Software as a Service (SaaS) applications. The design of enterprise controls has to keep pace and evolve away from on-prem to cloud-native apps, using data science to drive model-driven security.
The shift also fundamentally changed enterprise controls as on-premises IAM capabilities were substituted for access control in a cloud or SaaS deployment. However, threat actors also adjusted their approach, which meant the core IAM controls had to evolve with the tech. That saw the introduction of edge protection controls, such as using secure browsers rather than the traditional approach of virtual private network (VPN) tunnels.
The use of identity for continuous risk management and verification is well established in fraud management within financial services. But what’s new is the maturity of machine learning algorithms, which enable enterprises to apply identity in a near real-time model.
Traditionally, IAM practices relied on human labor to do the heavy lifting. Managers would have to approve employees’ access to resources, which created delays and workflow challenges and frustrated users. But a model-based approach reduces dependency on human behavior and increases reliance on models or near real-time decision-making to remove human involvement.
The benefits are significant as IAM controls improve while the productivity of the entire workforce improves. -
The Role of Cybersecurity Leaders as Educators
The Institute for Critical Infrastructure Technology
See publicationThe market for cyber security talent is getting scarcer every year yet the current practices in place by enterprises reflect an employment model that has been obsolete for many years. Cyber security leaders have to adjust their recruiting practices along with their leadership skills demonstrating a solid commitment to talent development to deal with the current market conditions. Unconventional techniques can enable cyber security leaders to both attract and grow diverse talent to meet the…
The market for cyber security talent is getting scarcer every year yet the current practices in place by enterprises reflect an employment model that has been obsolete for many years. Cyber security leaders have to adjust their recruiting practices along with their leadership skills demonstrating a solid commitment to talent development to deal with the current market conditions. Unconventional techniques can enable cyber security leaders to both attract and grow diverse talent to meet the future needs of the enterprise without increasing compensation or recruiting fees. The key is to consistently demonstrate a commitment developing talent and make adjustments to roles enabling employees to have an opportunity to learn and master new skills that they choose.
Cyber leaders have to collaborate with HR professionals to apply un-conventional techniques that are essential for the current and future market conditions. Enterprises can't hire cyber security professionals when they are needed due to the constraints of the limited supply of talent. The key is to shift the paradigm to hire top, diverse talent when you find it...not necessarily when you need it. Leaders should expand their networks and consistently recruit talent for loosely defined job categories with a minimum of requirements and encourage their teams to conduct exploratory interviews designed to understand what skills the candidate wishes to master. Top talent should be offered a role that is partially designed to give them an opportunity to learn what they wish to learn.
Cyber leaders should spend 30% of their time each week on talent development for their employees. CSO/CISOs should identify the development needs for their stakeholders and design curriculums for all of their stakeholders. This demonstrates a shift toward CISOs as educators to provide a multifaceted curriculum for all stakeholders in addition to a demonstrated commitment to talent development for all employees. -
The Growing Obsolescence of Passwords
ICIT Fellows Publication
See publicationIt's time for enterprises to develop an approach to eliminate the use of passwords. They served us well for 60+ years but digital consumers have too many digital assets to remember passwords for. Enterprises have an opportunity to shrink the attack surface, improve the digital experience and lower costs by implementing behavioral based authentication capabilities.
-
Why Data Science is Foundational for an Advanced Cyber Program
FS-ISAC Insights
See publicationThere are hundreds of new controls available when applying data science to cybersecurity control design within any enterprise. Most of these new controls don’t require a human action to initiate a risk management task or outcome. Models identify and track behavioral patterns using data streaming. Deviation from the patterns can be measured triggering a threshold of deviation that initiates an automated workflow to mitigate risk in milli seconds without a human involved. Cyber professionals…
There are hundreds of new controls available when applying data science to cybersecurity control design within any enterprise. Most of these new controls don’t require a human action to initiate a risk management task or outcome. Models identify and track behavioral patterns using data streaming. Deviation from the patterns can be measured triggering a threshold of deviation that initiates an automated workflow to mitigate risk in milli seconds without a human involved. Cyber professionals enhance their analytic capabilities and adjusts control points based on transaction trends.
-
Successful Women In Cybersecurity Podcast
CSO Magazine & IT Security ONE2ONESummits-Reed Exibitions
-
FS-ISAC 3rd Party Software Security Working Group
FS-ISAC
White paper on 3 additive controls for a 3rd party vendor governance program specific to software security
-
Beautiful Security
O'Reilly Media
Chapter 11
Other authors -
Honors & Awards
-
CSO Hall of Fame
CSO Magazine
Award winner for CSO Hall of Fame for 2020
-
Shared Assessments Lifetime Achievement Award
Shared Assessments
Honorees recognized for the contribution to cyber security resiliency over the course of their professional careers
-
Evanta 2017 Break Away Leadership Award
Evanta
This honor, built on peer recognition, spotlights CISOs who are revolutionizing their organization’s competitive position in the marketplace through visionary leadership and business transformation.
-
ISE Luminary Award
ISE
Founded in 2005, the ISE® Luminary Leadership Award is conferred on annual basis to an extraordinary industry executive at the ISE® North America Awards Gala. This prestigious award showcases and honors an outstanding leader and industry practitioner for their distinguished service, stewardship and contributions in advancing the information security industry.
-
Information Security Executive of the Year Award 2014 North America- Healthcare
T.E.N.
-
BITS Leadership Award
BITS
Recognition for leadership of cross sector working group on Supply Chain Security
-
ISE Northeast Award 2009
T.E.N.
Organizations
-
NYU
Adjunct Faculty Member
- PresentI design cybersecurity related content for the Tandon School of Business for NYU
Recommendations received
55 people have recommended Jim
Join now to viewOther similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content