Tag Archives: information security

How Does Your Kill Chain Maturity Measure Up?

How Does Your Kill Chain Maturity Measure Up?

In our work with Information Security (InfoSec) people at large, and with those in heavily regulated organizations, we typically find that they have the initial five steps in the kill chain under control.  These primarily involve “building the moat,” i.e.

Continue reading...

Put Up or Shut Up: Strategic Information Security

Put Up or Shut Up: Strategic Information Security

The idea of getting strategic around information is hardly new.  Records managers, IT enterprise content management (ECM) owners, information governance professionals, e-discovery owners — literally everyone involved in managing unstructured content — wants to stop being tactical and “get strategic” these days.

Continue reading...