Connecting the Dots Blog AllEnterprise Cyber Risk ManagementExpert ServicesSecurity Start-upVendor Market Acceleration Cybersecurity Thrives in An Organizational Context By Frederick Scholl | CIO, Cyber Security, Mark Settle Read → The First National Cybersecurity Summit By Frederick Scholl | Cyber, Pence, security, Summit, Trump Read → New Privacy Laws Require Security Professionals Up Their Game By Frederick Scholl | California, Consumer, GDPR, Privacy, security Read → Cybersecurity Workforce Development: Real or Imagined Problem? By Frederick Scholl | Cybersecurity, DHS, Workforce Read → Antidote for Fake Everything By Frederick Scholl | Baloney, Bologna, Fakenews, Sagan Read → Information Security Risks, Gray Rhinos and Black Swans By Frederick Scholl | Blackswan, Cybersecurity, Grayrhino, Informationsecurity Read → Managing Information Security On a Limited Budget By Frederick Scholl | Government Shutdown, Informationsecurity, IT Security Budget Read → Building a Security Start-Up By Frederick Scholl | Pivot, security, Start-up Read → Cybersecurity Risk Management for Directors By Frederick Scholl | Cybercriminals, Cybersecurity, Risk Management Read → My Reading List for Security Start-Ups By Frederick Scholl | Security Start-up, The Art of the Start, The Innovators Read → Should Your CIO Learn to Code? By Frederick Scholl | CIO, Coding, Tech Savvy Read → How IT Leaders Can Keep a Seat at the Table By Frederick Scholl | CIO Leaders, IT Leaders Read → Equifax points out—again—the need for speed in security management By Frederick Scholl | Cybersecurity, Equifax data breach, Security Management Read → Anatomy of a Security Breach By Frederick Scholl | Information Security, Security Breach Read → The Smartest Information Security Companies By Frederick Scholl | Information Security, MIT Technology Read → Book Review: Play Bigger By Frederick Scholl | Niche Marketing, Play Bigger Book Review Read → Long Term Beneficiaries of WannaCry By Frederick Scholl | Information Security, WannaCry Read → RISK: A NEW MOVIE ABOUT JULIAN ASSANGE By Frederick Scholl | Julian Assange, National Security, Wikileaks Read → TRADE SECRET THEFT CONTINUES UNABATED By Frederick Scholl | Cyber-attacks, Intellectual Property, Trade Secret Theft Read → TENNESSEE LEGISLATORS MUDDY WATERS AROUND PRIVACY BREACH NOTIFICATION REQUIREMENTS By Frederick Scholl | Encrypted Data, FIPS 140-2, Privacy Breach, Tennessee Legislature Read → LEADERSHIP CHECKLIST FOR SECURITY PROFESSIONALS By Frederick Scholl | Leadership, The Little Book of Leadership Development Read → SIEM VENDORS HAVE IT ALL BACKWARDS By Frederick Scholl | Machine Learning, SIEM vendor Read → THE SECRET TO GROWING YOUR SECURITY STARTUP By Frederick Scholl | Security Start-up Read → CLOUD JOBS PEAKING? By Frederick Scholl | Cloud Jobs, Job Openings Read → The Spy Who Couldn’t Spell By Frederick Scholl | FISA Court Proceedings, Information Security, The Spy Who Couldn't Spell Read → IS THERE A CYBERSECURITY PROFESSIONALS SHORTAGE? By Frederick Scholl | Cybersecurity, Professional Shortage, Risk Management Read → No Blue Pill for Cybersecurity Failures By Frederick Scholl | Cybersecurity Failures, DHS Read → Presidential Cybersecurity Commission Makes Some Good Suggestions By Frederick Scholl | Commission on Enhancing National Cybersecurity, National Cybersecurity Private-Public Program, NIST Cyber Security Framework (CSF Read → Understanding Intelligence By Frederick Scholl | CIA, Cyber Security, Hayden, Intelligence, NSA Read → Align Your Security Program With the Business By Frederick Scholl | CSO, Cyber Security, Governance, Information Security, NIST, PCI, security Read → Don’t fall victim to BEC By Frederick Scholl | BEC, Home Security, Information Security, Small Business Read → Enterprise Risk Management and Information Security By Frederick Scholl | Enterprise Risk Management, NACD, security Read → Evidence Based Risk Assessment: Lessons Learned from the Y-12 Breach By Frederick Scholl | Evidence, risk, security Read → First Conviction for Illegally Distributing Android Apps By Frederick Scholl | Android Apps, Convicted, Copyright Read → Locking Up the Ivory Tower By Frederick Scholl | Cyber Security, Hacking, security, University Read → Cloud Vulnerabilities By Frederick Scholl | Cloud, risk, Vulnerabilities Read → More Security Lessons Learned from the Y-12 Breach By Frederick Scholl | Monitoring, security, SLA, Y-12 Read → Security or Compliance? By Frederick Scholl | Compliance, Continuous Improvement, security Read → Home Disaster Recovery Planning By Frederick Scholl | Disaster, FEMA, Recovery, security Read → Cloud Computing: Trust but Verify By Frederick Scholl | Cloud, OSHA, Outsourcing, security Read → Background Checks May Not Be Enough By Frederick Scholl | Background Check, Maher, Mitnick, security Read → PERFECT SECURITY STORM FOR LAW FIRMS? By Frederick Scholl | Hacker, Law, Malware, Russinovich Read → How Not To Be a Cyber Janitor By Frederick Scholl | CMM, Compliance, RSA, security Read → SECURITY MEMO: IT CAN’T HAPPEN HERE, CAN IT? By Frederick Scholl | Background, Embezzle, security Read → Don’t Forget Cloud Availability By Frederick Scholl | Availability, Cloud Risk Read → Compliance v. Security By Frederick Scholl | Compliance, ISO 27001, Maturity, security Read → GAO Report on Information Security in Federal Government By Frederick Scholl | Federal, GAO, security Read → Lean Security By Frederick Scholl | Business, Harvard, Knowledge, Lean, security, work Read → Mitigate Your Social Engineering Vulnerabilities By Frederick Scholl | Engineering, Mitnick, security, Social, Vulnerabilities Read → HIPAA Security. Are We Making Progress? By Frederick Scholl | Breach, Compliance, HIPAA, security Read → Brand Your Security Program By Frederick Scholl | Branding, Communication, MIT, security Read → PDCA is Dead By Frederick Scholl | PDCA, security Read → LEARNING FROM PAST MISTAKES By Frederick Scholl | Bank, Comerica, court, Experi-Metal, fraud, Patco, Phishing, security Read → How Better Security Can Create Shared Value By Frederick Scholl | Porter, Regulation, security, Shared, Value Read → C’est La Vie, You Never Can Tell: Lessons Learned from the HBGary Hack By Frederick Scholl | Anonymous, Breach, Hbgary, security Read → DDOS Tutorial By Frederick Scholl | Attack, Botnets, DDOS, security Read → The future of information technology By Frederick Scholl | Cloud, Future, Internet, Mobility, security Read → Data Governance Anyone? By Frederick Scholl | Data, fraud, Governance, Online, security Read → Learning from the oil spill disaster By Frederick Scholl | Disasters, Oil, Risks, security, Spill Read → Down the Rabbit-Hole…Again? By Frederick Scholl | Compliance, Government, Regulation, security Read → Ideas on Risk Management By Frederick Scholl | management, risk, security Read →