Blog Posts

  • It has been my experience over the past 6 years or so, that the environment in a product-first, fast-growing scale-up is continuously changing and is regularly intense. Products are still being create...

  • I often get asked the question, “How do you successfully integrate information security requirements into your organisation’s processes?”. In most organisations, information security...

  • You’ve just taken on the role of Information Security leader in an organisation. You’ve started to build an understanding of the business and what your objectives should be for the next 10...

  • We’ve all been in situations where we mention a product to a friend and it suddenly shows up on our Facebook feed, or we search for something on Amazon and suddenly you find yourself looking at ...

  • Once you’ve gotten a good understanding of the Mission Essential Functions (MEFs) of the business (refer to my previous article here), you should start thinking about the processes that will be ...

  • Thank you Sonya Moisset for building such a valuable platform showcasing Epic Women in Cyber. Diversity is key in any field, and with women being heavily underrepresented in the cybersecurity field, t...

  • Starting a new job in a new business can be overwhelming. Especially if you are expected to set up the foundations of a security program in your first 100 days. It is easy to get carried away in your ...

  • The pandemic has forced organisations world-wide to re-think their people management strategies. Most of their workforce is now working from home and managing through fear and surveillance is no longe...

  • In my previous post, I introduced the term information security at its very basics. I went over, What is information security What is information Why do we need to protect it   In this article I ...

  • When I started writing up this blog, I sub-consciously had a certain audience in mind. The first few articles have required a level of understanding of information security, a shared knowledge of key ...

  • As security professionals, we often talk about taking a layered approach to security when describing the controls we implement to protect information. We understand the need to not have a single point...

  • Information security programmes are built on assessing risks and understanding what changes are required to make the unacceptable, acceptable. Information security objectives are reached through succe...

  • As an information security professional, I started off my career thinking infosec was all about technical controls – networking; infrastructure; application development. With time, I realised th...

  • Hey! My name is Diane, and this is my very first blog post on Strategic Security by Diane. In this post I would like to introduce why I have created this space, and what I would like to share through ...