Company Information /

Revisiting our 2015 “CIO Guide to a Successful Information Security Practice”

cyber podcast third series

The Third Series of our Cyber Security Transformation Podcast

 

The third series of our Cyber Security Transformation Podcast is focused on looking back at our 2015 series of articles entitled “The CIO Guide to a Successful Information Security Practice – 8 Key Management Pitfalls to Avoid”.

The series, originally published on the Corix Partners blog between May and June 2015, was our first attempt to frame our ideas around how to design and operate effective and efficient cyber security practices.

It has been followed by over 100 articles published since, on the blog and on other sites, all sharing the same values and the same vision: That cyber security cannot just be seen as a technology discipline, and that successful practices operate around a sound governance structure and a clear operating model active across all corporate silos, not just a collection of technical projects.

The 8 podcast episodes of this first part of our third series are summarised below, together with links to the original piece each comments on.

A summary piece for the 2015 series can also be found here on the Security Transformation Leadership publication on Medium

We would like to take this opportunity to thanks all our followers, and all of those – clients, partners, friends – who have been with us on this journey over the past 7 years, and have been instrumental in developing this narrative.

 


 

1- Think of Information Security as a Control function and not as a Support function

Click here to listen to the first episode of  the the Cyber Security Transformation Podcast – Series 3 – as released on 10 May 2022

JC Gaillard looks back at his 2015 series of articles published on the Corix Partners blog under the title of “The CIO Guide to a Successful Cyber Security Practice”; in this episode, he re-examines the first pitfall to avoid for CIOs and why cyber security cannot just be seen as an “enabler”

 

2- Create a sense of reality around the threats and do not focus only on IT aspects

Click here to listen to the second episode of  the the Cyber Security Transformation Podcast – Series 3 – as released on 17 May 2022

JC Gaillard continues to look back at his 2015 articles series “The CIO Guide to a Successful Cyber Security Practice” and highlights why risk management alone can no longer be the beating heart of cyber security practices

 

3- Focus resources on the proper implementation of key Controls and sell success

Click here to listen to the third episode of  the the Cyber Security Transformation Podcast – Series 3 – as released on 24 May 2022

JC Gaillard continues exploring and updating his 2015 series on the “CIO Guide to a Successful Cyber Security Practice”; in this episode, why throwing money at the problem is rarely the solution to maturity development around cyber security and why trust is paramount in the relation between the CISO and senior execs

 

4- Pin tactical initiatives against a long-term Information Security roadmap

Click here to listen to the fourth episode of  the the Cyber Security Transformation Podcast – Series 3 – as released on 31 May 2022

JC Gaillard continues his re-examination of his 2015 series of articles titled “The CIO Guide to a Successful Cyber Security Practice”; in this episode, why it is key to look beyond the short term and think in terms of process to drive effective and lasting change

 

5- Assign Information Security Responsibilities and Accountabilities

Click here to listen to the fifth episode of  the the Cyber Security Transformation Podcast – Series 3 – as released on 7 June 2022

JC Gaillard moves onto his 5th key management pitfall to avoid when building or rebuilding effective and efficient cyber security practices; in this episode, why it is key to think in terms of operating model and work with all stakeholders including HR, in the definition and distribution of cyber security accountabilities and responsibilities

 

6- Operate Information Security as a cross-silo practice and not just as a technical discipline

Click here to listen to the sixth episode of  the the Cyber Security Transformation Podcast – Series 3 – as released on 14 June 2022

JC Gaillard reaches a key point in his journey through the 8 key management pitfalls for CIOs and CTOs to avoid when building or rebuilding cyber security practices; in this episode, why it is key to see cyber security not just as a technology discipline, and to build it as a cross-sile practice from the start

 

7- Operate Information Security as an ongoing structured practice and not just a series of technical projects

Click here to listen to the seventh episode of  the the Cyber Security Transformation Podcast – Series 3 – as released on 21 June 2022

JC Gaillard reaches the 7th key management pitfall to avoid in his re-assessment of his 2015 series of articles entitled “The CIO Guide to a Successful Cyber Security Practice”; in this episode, why it is key to look a cyber security as a structured practice, and not just a collection of tactical activities and technical projects

 

8- Operate Information Security to focus on People and Process supported by Technology, not just the implementation of the latest Technical Products

Click here to listen to the eigth episode of  the the Cyber Security Transformation Podcast – Series 3 – as released on 28 June 2022

JC Gaillard reaches the final part in the re-examination of his 2015 series titled “The CIO Guide to a Successful Cyber Security Practice”; in this episode, why it is key to think in terms of process first when architecting a cyber security practice, and not in terms of technical tools

 


Contact Corix Partners to find out more about developing a successful Cyber Security Practice for your business.

Corix Partners is a Boutique Management Consultancy Firm and Thought-Leadership Platform, focused on assisting CIOs and other C-level executives in resolving Cyber Security Strategy, Organisation & Governance challenges.