Syndicated Blog

Stories by Matt Palmer on Medium
Stories by Matt Palmer on Medium
Crossing the road

Crossing the road

| | Cybersecurity
Last week I spoke for Jersey Cyber Security Centre ( CERT.JE) about the changing threats facing us — from the very active offensive cyber campaign forming part of the war in Ukraine, to the ...
How to start a career in cyber security (or anything else)

How to start a career in cyber security (or anything else)

Photo by Andrea De Santis on UnsplashI was asked again today by someone just starting out, how to start a career in cyber security. What did I do, and should they do the same?The ...
Welcome to never-war

Welcome to never-war

Recently I was invited to share my thoughts on our current threat landscape and emerging cyber risks, and how to plan for the right actions to respond to this risk. I am ...
How to build a cyber capable board

How to build a cyber capable board

Photo by Benjamin Child on UnsplashIn just a few years, cyber has transformed from the nerd in the corner into the Kim Kardashian of risk. Everyone, it seems, has an opinion on the ...
We’re not hiring unicorns. But that doesn’t mean any less effort.

We’re not hiring unicorns. But that doesn’t mean any less effort.

Image copyright CERT.JE / Matt PalmerBy any assessment the effort I’m going to hire well feels extreme. Far more so than I have done in the past. I wanted to work a bit ...
What the Titanic can teach us about cyber risk

What the Titanic can teach us about cyber risk

TitanicAny company that has been around long enough will have stories that define or explain its culture or purpose. When I was CISO at Willis Towers Watson, one of those stories was ...
Practical Steps to Reducing Cyber Risk

Practical Steps to Reducing Cyber Risk

Cyberattacks are hard to contain and can quickly impact any organisation — whether a target or not.Photo by Rostislav Artov on UnsplashReminding us of this fact, recent tensions in Ukraine and a range of cyberattacks that ...
When Privacy conflicts with Security, here’s how to fix it

When Privacy conflicts with Security, here’s how to fix it

Data protection and cyber security priorities can often feel in conflict. However some simple tools can help you get everyone on the same page.This article reflects on a talk I delivered for the ...
How to share bad news

How to share bad news

Management theory is full of advice on how to share isolated elements of bad news amongst lots of good. But what about when the news is mostly bad?The Deepwater Horizon Oil Spill in ...
What Do IT Auditors Really Do?

What Do IT Auditors Really Do?

To operations, technology and cyber security leaders, auditors are often seen as a necessary evil. As a result, how audits are actually delivered often feels like witchcraft. So what exactly do they ...