Posted in Business on May 25th, 2017
I just want to inform you all that I have resigned from Sogeti to join Microsoft as a Cybersecurity Architect. This blog will continue to operate independently and still just reflect my views on different topics, assignments that I could share and so forth. Just continue to let the mails come and I´ll try to […]
Read Full Post »
Posted in Business, Security Architecture on Mar 23rd, 2017
A client of mine was hit by a simple ransomware this morning and it costed her one workstation and a few hours in reinstallation. She has listened to me and implemented a good way to manage reinstallation of clients and take backups. This specific company has removed file shares and are using SharePoint instead so […]
Read Full Post »
Posted in Business, Methodology on Oct 5th, 2016
None of you raises an eyebrow when I say that I work at Sogeti and as all other consulting firms together with my clients we struggle with finding the right people. Finding junior staff is rather easy, keeping them a bit more challenging as it should be. But the senior people, like me, are harder […]
Read Full Post »
Posted in Business on Apr 30th, 2016
My team managers asked me what to look for in a security specialist CV. The quick and direct answer they got from me was: ‘A valid CISSP certification’. As you could imagine they looked like living question marks so I had to explain it a bit more. A CISSP certification is a very strong certification […]
Read Full Post »
Posted in Business on Apr 4th, 2016
My challenge this month have been conducting a large risk analysis at a client. The challenge has been the estimate of the analysis as it turned out that when lifting all the rocks we found more than our share of cans of worms. This is not an unusual situation however. Many times an organisation think […]
Read Full Post »
Posted in Business, Security Architecture on Feb 2nd, 2016
One of my readers wanted to know more of what type of challenges I´m facing when I´m at my clients to more understand what I do as a security architect. This month challenge is therefore how to justify a cloud strategy based on security requirements. Working at a client they asked me about cloud security […]
Read Full Post »
Posted in Business, Security Architecture on Jan 12th, 2016
A report from ’Trusselsvurderingsenheden ved Center for Cybersikkerhed’ in Denmark shows that the threat level against Denmark’s authorities and private companies are very high. According to Thomas Lund-Sørensen, manager for Center for Cybersikkerhed, this means that hacks are occurring. This comes as no surprise for anyone working in this field but the interesting questions are […]
Read Full Post »
Posted in Business, Technology on Dec 15th, 2015
I´m currently spending no money of getting Wi-Fi on-board as there apparently was a glitch of some kind. My Wi-Fi connection just started without me having to pay. Currently I´m flying over to US and just wanted to say that a CEO is having a phone meeting on route and is discussing a hostile takeover. […]
Read Full Post »
Posted in Business, Methodology on Nov 14th, 2015
During many years I have been an advocate of never letting go of the control of you security but during my last years I have been forced to revaluate that opinion. As most of you are aware of finding the right resources for employing is hard and paying for the right resources is even worse. […]
Read Full Post »
Posted in Business, Security Architecture on Nov 10th, 2015
Soon I´m doing flight 200 this year, it´s me and George. 😉 Still I wonder why so many fellow travellers don´t protect their computer screens. Sitting in my seat 9D I currently see one person writing a letter of resignation, one is creating a proposal, one is reading a report about their company being compromised […]
Read Full Post »