Skip to content
  • About
  • Resilience
  • Analytics
  • Architecture
  • Testing
  • Management
  • Risk
  • Other
A black swan

Black Swan Security

A blog about cybersecurity.

Author: Phil

May 24, 2011April 1, 2022 Phil

How to develop a security test strategy, part one

Testing

This is the first of a series of posts describing how to put together a security testing strategy and the associated test plans. Part two is here and part three is here. What is a security test strategy A security test strategy is a key document deliverable to get into…

Read More
May 23, 2011April 1, 2022 Phil

What I need from pen test reports.

Testing

I get a lot of pen test reports to read. They vary from beautifully crafted prose extolling the skilled exploitation of the system by security testing artistes to functional dumps of tool output into a word format by jobbing vulnerability scanners. Usually I read that report once, I use the…

Read More
April 22, 2011April 1, 2022 Phil

Infosec London, BsidesLondon & DC4420 – A busy few days

Other

This week I dived back into the UK security industry outside my current little security silo to see what people were up to and see what I’d missed. I made it to Infosecurity Europe 2011 on Tuesday afternoon. Infosec is a vendor exhibition, they’ve tagged on a set of lectures but they…

Read More
April 13, 2011April 1, 2022 Phil

User-Sourced Security Monitoring

Architecture

One of the constant challenges I face delivering big systems is meeting the protective monitoring requirements. A lot of the requirement to spot technical events (low level network probing, back door installation, beaconing and command and control channels) can be covered with a bundle of vendor products integrated into a…

Read More
April 12, 2011April 1, 2022 Phil

6 Questions about security the board care about

Management

Another short post to break up the big essays I tend to write. These are the questions any Security Manager worth his salt needs to have prepared answers for anytime he attends the board of the company or socialises with board members: Are we safe ? Can I take responsibility for…

Read More

Posts navigation

Older posts
Newer posts

Recent Posts

  • What I’ve learnt writing cyber strategies with grand scopes
  • What do we protect in Cybersecurity?
  • Managing Identity Consciously
  • Why I don’t like PIGs in Security Risk
  • Security Folkways and Deliberate Security Culture
  • Homebrew Monte Carlo Simulations for Security Risk Analysis Part 2
  • Open Security Summit 2020
  • What are we missing in risk?
  • Commercial & Government Cyber Conversation
  • Through the barricades..
  • Modern Security Risk Presentation
  • What are Information Assets?
  • Dressing up security with Bow-Ties
  • Asset Management Measurement for Cyber
  • Triage in Supply-Chain Cyber Risk Management
  • Security on the Bottom Line
  • What is Likelihood?
  • What is Information Security Risk?
  • Serious Business?
  • Invest in the CIO, before the CISO

Tag Cloud

44con 27001 analytics architecture assurance big data board boardlevel ciso conference cyber cyber resilience cyber security cynefin data science engagement governance information security infosec leadership management measurement OODA pen testing principles protectivemonitoring regulation resilience resistance risk security security analytics security architecture zones trust securitymanagement security management security management cyber securitymonitoring security risk securitystrategy securitytest security testing strategy supply chain testing third-party

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

If you would like to ask a question or comment on anything I have written here please contact me via Twitter at @oracuk, if you can please link back to the post in question in your tweet.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.