Stories by Brian Contos

Congrats - you’re the new CISO…now what

If you’re a security executive new to an organization you know better than most that you often suffer from not knowing the state of your security posture and because of this you are forced to operate tactically. What’s needed is a baseline about the current state of your security posture across people, process and technology which ultimately alleviates headaches and allows you to approach security more strategically.

Brian Contos | 07 Mar | Read more

How to convince the CFO of the budgetary security need

It had been custom for organizations to think of cyber security in terms of an information technology (IT) problem best left to IT people to address and fix. However, as more prolific breaches were publicized exposing a variety of sensitive personal, financial, and intellectual property-related data, it became clear that this was a rather myopic view in today’s increasingly interconnected world.

Brian Contos | 10 Feb | Read more

5 sins cybersecurity executives should avoid

With the advent of 2016, I was tempted to touch upon my thoughts on what the future of the cyber landscape will hold, prognosticating trends and shifts and what the next big threat would be. However, upon deeper reflection and further review of 2015, I’ve decided to focus on what we as cyber security executives have control of and can influence, as those have a direct and more profound impact on the organizations we steward. The “Five Sins” may seem hyperbolic but given the fact that organizations are continuing to make the same mistakes without trying to rectify them, I think it’s fitting particularly at the end of the year when we aspire to be better than we were yesterday, but not as good as we hope to be tomorrow.

Brian Contos | 04 Jan | Read more

Thinking outside the product box

The dynamic nature of the cyber threat landscape guarantees that the threats and the actors behind them are always evolving, increasing in sophistication in order to circumvent the most robust security devices. As such, our cyber security mindset must evolve as well both from an understanding of what new and emerging threats we will face and the types of security solutions available that will best support the cyber security posture of our organizations and protect our most sensitive information.

Brian Contos | 10 Dec | Read more

Phishing, football and frauds: 15 ways to safeguard yourself during the World Cup

I just returned from Brazil where the anticipation around the 2014 FIFA World Cup was astounding. Even though Brazil has won the Word Cup several times, this is the first year they've hosted since 1950. As with many countries where soccer ("football") inspires nationalistic pride, promotes escapism or more simply provides the zenith of sports entertainment, most Brazilians have an insatiable hunger. The media, event sponsors and retailers are more than happy to overindulge their appetites. From clothing and restaurants to television and Internet – the World Cup is everywhere.

Brian Contos | 11 Jun | Read more

Big data security context

I just finished up a lengthy tour through Latin America and Asia, as described in many of my latest blogs. Most recently I was in Australia and New Zealand (ANZ). I had the opportunity to work with various government agencies, organizations within critical infrastructure and general enterprise businesses across ANZ. Their primary topic of interest: big data. More specifically, they were interested in determining what needs to be part of a successful big data security strategy.

Brian Contos | 16 Apr | Read more