Skip to main content

Posts

What to Outsource (Without Losing Control)

Recent posts

How to Scale Your Team (Without Losing Executive Support)

InfoSec Made Easy Building Your Security Team Series — Part 3 of 3 Hiring Order, Headcount Justification, and Career Path How to grow your security team in the right sequence, make the business case for every hire, and build a place where good people want to stay Building a security team isn't a single event. It's a sequence of decisions made over months and years, each one shaped by where you are, what your biggest gaps are, and what the business can realistically support at any given moment. Get the sequence right, and each hire builds on the last — compounding your capability and reducing your risk in a logical, defensible progression. Get it wrong, and you end up with a team whose structure reflects a series of reactive decisions rather than a coherent strategy. That's what this post is about: the order in which you build, the language you use to justify each step, and the career infrastructure that keeps talented people engaged and growing onc...

How to Build a Security Team in a Midsize Organization

InfoSec Made Easy Building Your Security Team Series — Part 1 Start With Structure, Not Titles How to build a security team that actually covers what matters — without an enterprise budget or a Fortune 500 headcount You didn't wake up one morning and decide to build a security team from scratch. More likely, you were handed a problem. Maybe it came with a title — Security Manager, Director of Information Security, or some variation — and a set of expectations that significantly outpaced the resources available to meet them. Or maybe you've been carrying security responsibilities alongside everything else for so long that formalizing the function finally became unavoidable. Either way, here you are. You have to build something real. And you have to do it with constraints that most security frameworks and leadership textbooks don't fully account for. This post is for you. Not for the CISO of a 10,000-person enterprise with a $50 million security budget and a team of specialis...

NIST CSF 2.0 Respond – Mitigation (RS.MI) Explained

If Incident Management is about orchestration, Incident Analysis is about understanding, and Response Communications is about control of the narrative, then Mitigation is about decisive action . Mitigation is where security teams move from talking about risk to actively reducing it —while the incident is still unfolding. In my experience, this is the moment executives remember most: “Did we stop the damage?” NIST CSF 2.0 Respond – Mitigation (RS.MI) exists to ensure that the answer is yes. What Is RS.MI in NIST CSF 2.0? RS.MI focuses on containing, eliminating, and limiting the impact of a cybersecurity incident through deliberate technical and procedural actions. It addresses questions such as: How do we stop the threat from spreading? What actions reduce immediate business impact? How do we prevent reinfection or recurrence during response? How do we balance speed with safety? Mitigation is not recovery—and it is not root cause analysis. It is controlled damage reduction under pr...