Saturday, November 22, 2014 Register
 
CISOs, CSOs, Security Professionals, Project Managers.....Welcome!
CISOHandbook.com is a resource site for CISO's, CSO's, and security professionals. A place where security executives, managers, and practitioners can share ideas, challenges and opportunities associated with developing, participating, or managing Enterprise Security Programs.
 
The site contains metrics, tools, opinions, and most importantly access to CISO's, CSO's, experts, and other professionals in the field of security.  The sole intent of the site is to share information, ideas, tips, and techniques for addressing security issues faced by today's professional. 
 
The content of CISOHandbook.com is free to all however there are some areas that can only be accessed through registering and logging in. Registration is fast, free and easy, so what are you waiting for!
How do you Measure Up? Take the Security Leader Assessment

This assessment is designed to evaluate your current progress as a security leader, within your specific environment. As we see the security industry changing we want to get a temperature for how security leaders are doing within their environment. As follow up with this survey we will aim a lot of our energy and focus to provide resources and content that tangibly help security leaders and equip them to improve and optimize their security programs and roadmaps.

Click here to take the assessment and see how you measure up.
Featured Security Opinion

Building a C+ Security Effort - 5 Tips to Achieve What Your Execs Want & Business Needs: Making the Security Grade

By Mike Gentile, CISSP and CISOHandbook.com Team

5/21/2013

Article:


In today’s security landscape, it is clear that the challenges of the security discipline are growing at a rapid pace. From immature techniques for fixing security issues to a lack of available and experienced security resources to perform all of the required tasks. Of all these concerns, one of the most prevalent issues I have seen lately (with dramatic consequences, by the way) is the impact of many in security craving to be A+ students in environments that are fine with a C+.

More Security Articles

This area of the site explores controversial ideas, opinions, or judgments that are being observed by our team within the security community. Many of these concepts might run contrary to that of the majority....Good, since the point of this exercise is to fuel debate.  Please feel free to provide your opinions and comments regarding these ideas; it makes us all just a little bit smarter.  Further, don't be shy about suggesting topics that you would like us to use in the future on the site.

Below is a list of recent opinions:

Building a C+ Security Effort Series
Hungry for Talent Series
    Getting Value from Your Security Value Added Reseller
    Acquiring Security Talent Article Series

    Cheating Cloud Syndrome Series

    More Articles


    Security Opinion

    Understanding the Tangible and Intangible Elements of a Security Program

    By Mike Gentile, CISSP and CISOHandbook.com team 

    Preface:

    Building security programs is difficult.  They have many moving parts and require those who lead them to have knowledge across many different disciplines. Over the years, the team at CISOHandbook.com has strived to develop models that can help with solving this security program development riddle. This article will discuss some improvements and enhancements we have made within our models in helping you develop the right security programs for your organization.

     


     
    Security Opinion

    3 Tips for Measuring the Value of a Proposed Security Project

    By Mike Gentile

    Preface:


    Many security programs spend countless hours every budget cycle trying to determine which projects to undertake for the upcoming year. Should we replace our firewalls, should we take on that federated identity management project (yuck!) Perhaps we should go with old reliable and do what our favorite research organization tells us to do (Bad choice).  One of the key components during this process is to determine the value of performing a specific security project, thus providing a decision criterion about whether it should be put on the “to-do” list or not. This article will provide simple but effective tips for determining the value of a proposed security project in the common organizational security program setting.
    On-line Security Program Health Tool

    Now Available! 
     
    On-line Security Program Health Tool
    • Want To See How Your Security Program Measures Up?
    • Want To See How It Compares To Other Organizations?
    • Want to Get The Results Instantly?
    • Oh Yea, It Is Also Free Courtesy Of CISOHandbook.com.
    • Do You Have More Questions? View the FAQ

    Click Here To Check It Out!

    This practical, easy-to-use tool enables the user to identify the strengths and weaknesses of their security program across six core areas including:

    • Program Strategy
    • Mission And Mandate
    • Roles and Responsibilities
    • Security Policies
    • Security Project Portfolio
    • Training And Awareness
    Additionally, your review is benchmarked against all of the other organizations that have used the tool, providing you even more statistical information.

    Everyone has asked for it, so here it comes...Don't miss out!
    Security Opinion

    Dealing with Secondhand Stress

    By Daniel Johnson, SBN Principal Partner, Balance.point/Self Mastery Foundation Inc. 
     
    If you have been following this series, you now have a toolkit of techniques and strategies to manage stress quickly and effectively.

     

    The next question you may ask is:  How do I deal with stress at the source? 

     
    CISOHandbook Survey

    Participate in Our Study!

    We are conducting a survey for research we are performing in the domain of information security. The goal of this reseach is to help identify tools, tips, and techniques that can aid security professionals with the intangible complexities associated with implementing security in the modern organization. In addition, for your time as a survey participant, we will provide you the trended results from the survey in 2011.
     
    Click Here to Take the Survey!
     
    The Elephant in the Room
     
      
     
    Premium Sponsor
    Delphiis :: Control What You Can
    Buy Now on Amazon
                            
     


    CISOHandbook.com Founder Tweets
    Stay Up To Date
    xml.gif 
    Sponsors
    Upcoming Events
    SecureworldExpo
    Advertise with us?
    Premium Sponsors