San Francisco, California, United States
Contact Info
17K followers
500+ connections
About
Articles by Richard
-
A CISO said, “I’m fed up with APPSEC errors! I must make better product choices.” This is my How To Measure Anything based response.
A CISO said, “I’m fed up with APPSEC errors! I must make better product choices.” This is my How To Measure Anything based response.
By Richard Seiersen
-
A CISO asked, “What is security usability? Why do I care?”
A CISO asked, “What is security usability? Why do I care?”
By Richard Seiersen
-
A Product Security Leader asked, “What are escape rates?” This is my condensed answer.
A Product Security Leader asked, “What are escape rates?” This is my condensed answer.
By Richard Seiersen
Activity
-
Thank you Australian CISO Community! I had an amazing week enjoying your hospitality, intellectual curiosity, and Vegemite! As the locals wisely…
Thank you Australian CISO Community! I had an amazing week enjoying your hospitality, intellectual curiosity, and Vegemite! As the locals wisely…
Shared by Richard Seiersen
-
#Oracle released its third quarterly edition of Critical Patch Update, which contains patches for 386 security #vulnerabilities. Read more here…
#Oracle released its third quarterly edition of Critical Patch Update, which contains patches for 386 security #vulnerabilities. Read more here…
Liked by Richard Seiersen
-
If you are heading to Black Hat – sign up for one of our two supper clubs... Where we will "Rethink The Risk Of AI" together:…
If you are heading to Black Hat – sign up for one of our two supper clubs... Where we will "Rethink The Risk Of AI" together:…
Shared by Richard Seiersen
Experience & Education
Licenses & Certifications
-
CISSP
-
-
CREA
-
-
GSNA
-
Publications
-
The Metrics Manifesto
Wiley
The Metrics Manifesto: Confronting Security with Data delivers an examination of security metrics with R, the popular open-source programming language and software development environment for statistical computing. This insightful and up-to-date guide offers readers a practical focus on applied measurement that can prove or disprove the efficacy of information security measures taken by a firm.
The book’s detailed chapters combine topics like security, predictive analytics, and R…The Metrics Manifesto: Confronting Security with Data delivers an examination of security metrics with R, the popular open-source programming language and software development environment for statistical computing. This insightful and up-to-date guide offers readers a practical focus on applied measurement that can prove or disprove the efficacy of information security measures taken by a firm.
The book’s detailed chapters combine topics like security, predictive analytics, and R programming to present an authoritative and innovative approach to security metrics. The author examines historical and modern methods of measurement with a particular emphasis on Bayesian Data Analysis to shed light on measuring security operations. -
How To Measure Anything In Cybersecurity Risk
Wiley
How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of…
How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.
Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.
Discover the shortcomings of cybersecurity's "best practices"
Learn which risk management approaches actually create risk
Improve your current practices with practical alterations
Learn which methods are beyond saving, and worse than doing nothing
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.Other authorsSee publication
Honors & Awards
-
ISE North America Security Project Of The Year in Healthcare
ISE
Operational Risk Management (ORM) is an web services based framework that applies business intelligence to the IT security domain. ORM's focus is prioritizing the treatment of unmitigated residual risk in relationship to defined risk tolerances against massive enterprise data sets.
Recommendations received
8 people have recommended Richard
Join now to viewMore activity by Richard
-
What an outstanding week running 9 cyber risk workshops across the country! On behalf of our customers, partners, and my team, I want to express…
What an outstanding week running 9 cyber risk workshops across the country! On behalf of our customers, partners, and my team, I want to express…
Liked by Richard Seiersen
-
Qualys President & CEO Sumedh Thakar chatted with Matt Alderman and the #BusinessSecurityWeekly team about the significance of CISOs and CEOs using a…
Qualys President & CEO Sumedh Thakar chatted with Matt Alderman and the #BusinessSecurityWeekly team about the significance of CISOs and CEOs using a…
Liked by Richard Seiersen
-
Let me guess - the risks for these IT issues today were a likelihood of "2", a severity of "high", and an overall risk of "yellow."
Let me guess - the risks for these IT issues today were a likelihood of "2", a severity of "high", and an overall risk of "yellow."
Liked by Richard Seiersen
-
Is your board asking, "What are you doing about AI Risk?" Are you (and your eteam) looking for answers? Perhaps you have answers you are open to…
Is your board asking, "What are you doing about AI Risk?" Are you (and your eteam) looking for answers? Perhaps you have answers you are open to…
Shared by Richard Seiersen
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More