Blog

We regularly post our thinking here because ideas are best shared. It might be our approach to solving a problem (we’re not fans of reinventing the wheel!), perhaps simply something else entirely that has piqued our interest! We cover methods for cyber risk assessment, approaches for cyber risk quantification, tools and templates for cyber risk management, tips for running successful security programmes, and much more!

You can join us at @cydeaHQ on Twitter, or our LinkedIn page to discuss any of our posts. If you’d like to know each time we add a new post, you can subscribe for notifications and a few other choice bits of content.

...
Joining Cydea - reflections one month in…

New joiner apprehension… Joining any new team brings a group of thoughts and, in turn, feelings that are often contradictory. There’s a glimpse of excitement challenged with a hint of anxiety, a splatter of apprehension with a smudge of confidence.

Continue reading...
...
The link between risk scenarios and detection use cases

Earlier last year, I delivered a webinar on the importance of mapping risks and understanding threat coverage for a successful security monitoring strategy.

Continue reading...
...
How we work together

More and more businesses are adopting a hybrid working model, driving the need for collaborative tools to facilitate remote team working.

Continue reading...
...
Selecting a control framework

There’s no “right” control framework, it’s about finding what works best for you. Control frameworks are used to improve cyber security posture and manage cyber security risks.

Continue reading...
...
Why cyber risks should belong to business decision makers and not the IT department

Risk management is an essential part of business. It heavily relies on two things: a way of qualifying/quantifying risks pertaining to a certain area of the business, and a decision being made on the method of treatment for each risk.

Continue reading...
...
Thoughts on the updated ISO 27002

In my previous blog post, we looked at the latest changes to ISO 27002. This included the changes to the controls with the new additions and the attributes table.

Continue reading...
...
Risk Advisory: LastPass Data Breach

Cydea’s risk advisories are intended for senior management to aid their understanding of current events and the cyber risk posed to their organisations.

Continue reading...
...
What you need to know about the newest changes to ISO 27002

ISO 27002 is an international standard that defines a range of information security controls that can be used to manage risk.

Continue reading...
...
Risk Advisory: UK government ban on Chinese surveillance equipment

Cydea’s risk advisories are intended for senior management to aid their understanding of current events and the cyber risk posed to their organisations.

Continue reading...
...
Starting a career in the world of cyber security

For the first four years of my professional life I worked as a Development Engineer in the Automotive Engineering industry. It’s been a full year now since I made the decision to change fields to the rapidly expanding industry of Cyber Security, and now feels like a good time to reflect on my journey so far: my background, why I made the jump, and my reflections against what I expected.

Continue reading...
...
How to Write KRIs for Executive Reporting

In a previous blog post, we looked at the difference between KPIs and KRIs. So what’s the best way to come up with some Key Risk Indicators (KRIs) for your business?

Continue reading...
...
Certification is about rules, compliance is about trust

Various schemes and standards exist to provide assurance of baseline controls and good cyber security practices within an organisation. They may be internationally recognised such as ISO 27001, or even government backed, like the UK government scheme Cyber Essentials or IASME Governance.

Continue reading...
...
Get early access to Cydea's Risk App

It feels like a long time ago now. On 4th March 2020 we put the call out for help in developing a better way to measure and manage cyber risk.

Continue reading...
...
Why is estimating an important skill?

How many sweets are in the jar? As well as playing an important role in our daily lives, estimates are crucial to an organisation’s success.

Continue reading...
...
How to develop cyber security consciousness

Good security depends on people being aware about security issues. A good way to minimise cyber risk is by encouraging people to be more security conscious in the first place.

Continue reading...