Five things Digital Security Leaders can learn from Elon Musks Twitter takeover

Five things Digital Security Leaders can learn from Elon Musks Twitter takeover

First of all, we don’t drive a Tesla and are not Elon Musk fans. However, we do think that the recent developments since Elon Musk took over Twitter bring some interesting insights and learnings. Where multiple people coin Elon Musk as a poor leader, we tend to believe differently and share a different perspective. At the moment of writing this blog, Elon Musk just decided to step down as Twitter

The IKEA effect on Cybersecurity investment decisions

The IKEA effect on Cybersecurity investment decisions

Have you ever been to an IKEA store? Then you are perhaps already familiar with the satisfying effect of assembling and building stuff yourself. The IKEA effect has been investigated extensively in behavioral and decision sciences. But what does it tell us, and how does it help us with better cybersecurity investment decisions in the long term? What can we learn from the IKEA effect, and how does it help

Why Security Awareness Campaigns aren’t enough for secure behavior

Why Security Awareness Campaigns aren’t enough for secure behavior

How to create an attitude of “I have to” towards “I want to.”  It’s October again, and this means it’s security awareness month! This month, we hang posters, give away some goodies, do hackathons, do hack competitions, and probably do some security awareness training. All good, but does it change people to behave more securely “aware”? Why do some of us -still- drive too fast We all know that driving

Yuri Bobbert guest at the Podcast “Change Dynamics”

Yuri Bobbert guest at the Podcast “Change Dynamics”

Yuri Bobbert was recently a guest in the Podcast Change Dynamics. Listen to Episode #9 “Zero Trust requires another way of thinking” where Yuri talks about the book “Leading in Digital Security” and related topics like: Cultural Change, Leadership, CISO Archetypes, Craftmanship, Design Science Research and Zero Trust as a Service. Listen to the podcast here, on Spotify or Apple Podcast.

Four angels to avoid the risk of Cyber Security Fatigue

Four angels to avoid the risk of Cyber Security Fatigue

Every day we get overwhelmed with information about cyber security. Whether it is security staff monitoring security logs, IT staff constantly patching, or managers hearing about required improvements, the list goes on and on. As a result, people develop cyber security fatigue. Cyber security fatigue can also be defined as virtually giving up on proactively defending against malicious actors. According to a CISO benchmark study of technology vendor Cisco, 42% of

Five questions the board can ask to stay “Left of Bang.”

Five questions the board can ask to stay “Left of Bang.”

Much uncertainty and fear are sown in the media about Ransomware attacks. Whether Ransomware is a big problem remains to be seen. Recent research shows that ransomware has no impact on the economic value of the organization1. The question is more what form of impact we know; technological, political, economic, or social. We know from experience that the stock price is not the only yardstick for determining the effects of

Duurzame CISO is vooral leider in gedragsverandering

Duurzame CISO is vooral leider in gedragsverandering

Dit artikel is gepubliceerd in AGConnect nummer 1/2 -januari/februari 2022 Digital Security is niet langer het werkveld van een enkeling. De bedrijfsrisico’s zijn groot en niet alleen security professionals moeten aan de slag om informatiebeveiliging goed in te regelen, ook de IT’er en alle andere medewerkers. Informatiebeveiliging slaagt alleen als iedereen precies doet wat zij of hij moet doen. Of vooral: Mag. Het belang en het speelveld van digital security

Never trust and always verify – the increasing number of cyber threats & risks

Never trust and always verify – the increasing number of cyber threats & risks

The increased digitization of the world we live and work in, has given rise to an increasing number of cyber threats and IT-risks. Over the past few years, we’ve seen a huge surge in the number, the intensity, and the sophistication of the attacks. But it’s not all doom and gloom. With proper technical solutions such as firewalls, antivirus programs , back-ups and a no-trust attitude, companies can better defend

Why Fear, Uncertainty and Doubt (FUD) fails in Digital Security and being BAD prevails

Why Fear, Uncertainty and Doubt (FUD) fails in Digital Security and being BAD prevails

We all know these cybersecurity specialists or security software sales representatives that want people to act in a certain way or buy certain products by saying things like, “if you don’t do (or buy) this, you will be hacked.” Sadly, this way of communicating is still an often-used approach in Information Security to get the message across or motivate people to “buy” their products or service. We call this approach FUD. FUD