Consulting CISO
I was recently invited to present to security and IT leaders at a vendor’s gathering of small early-stage biotechs. I packaged up a deck with the anatomy of an attack, the NIST CSF process for defense, and our operating model for running a security program, including measures I saw as basic table stakes (anti-malware, email … Read more
Read More