Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity
Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
You did the thing every business does: You launched an IT project. Maybe it was a migration. Maybe a new app rollout. Maybe you just “upgraded some systems.” Great. You made the investment. You expected ROI. But here’s the question ...
Let’s be honest. You probably don’t lose things. You don’t misplace your keys. You don’t forget where you parked. And your phone? It’s probably surgically attached to your hand. But here’s the thing—phones get lost. Phones get stolen. And if ...
I was having dinner the other night with a CEO of a $2 million MSP. He was excited. Like, jittery-excited. We hadn’t even ordered drinks before he started laying out all the “amazing things” his company had going on. New ...
I had breakfast with Jim Collins the other day. Okay—he was on stage. I was in the crowd of 400 CEOs, frantically taking notes while inhaling burnt coffee and half-warm Styrofoam eggs. But I was there. I heard him speak ...
Last night, I went to a different kind of event. Usually, I’m surrounded by the people who write code, deploy firewalls, and clean up the digital blood after a ransomware attack. The folks who actually know how a single missed ...
Let me let you in on a secret that’s helped us have the most successful quarter in our company’s history—and no, it didn’t come from a flashy tool or another overpriced consultant. It came from our software developers. Yeah. The ...
My phone goes off. A text from a number I don’t recognize: “I’ll be late for lunch.” I pause. Do I respond? Who is this? Maybe it’s a coworker. A friend. A client. But here’s the truth: It’s not. It’s ...