{"id":54,"date":"2023-07-12T01:18:09","date_gmt":"2023-07-12T01:18:09","guid":{"rendered":"https:\/\/digisentinel.org\/?page_id=54"},"modified":"2023-08-02T22:03:56","modified_gmt":"2023-08-02T22:03:56","slug":"cyber-security-leadership-thoughts-ideas","status":"publish","type":"page","link":"https:\/\/digisentinel.org\/index.php\/cyber-security-thoughts\/cyber-security-leadership-thoughts-ideas\/","title":{"rendered":"Cyber Security Leadership Thoughts &#038; Ideas"},"content":{"rendered":"<ul class=\"wp-block-latest-posts__list wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/digisentinel.org\/index.php\/2025\/11\/30\/innovation-isnt-improvement-lessons-from-the-frontlines-of-change\/\">Innovation Isn\u2019t Improvement: Lessons from the Frontlines of Change<\/a><div class=\"wp-block-latest-posts__post-excerpt\">Introduction: Innovation That Actually Ships In cybersecurity, innovation is often treated like a slogan&nbsp;&nbsp;something we talk about more than we practice. We attend conferences filled with visionary keynotes, evaluate platforms promising to revolutionize threat detection, and brainstorm automation ideas in post-incident retrospectives. But turning those ideas into something that ships;&nbsp;&nbsp;something real, useful, and adopted is where most efforts stall. Over\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/digisentinel.org\/index.php\/2025\/11\/30\/innovation-isnt-improvement-lessons-from-the-frontlines-of-change\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Innovation Isn\u2019t Improvement: Lessons from the Frontlines of Change<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/digisentinel.org\/index.php\/2025\/04\/27\/the-importance-of-metrics-in-a-security-operations-center-soc\/\">The Importance of Metrics in a Security Operations Center (SOC)<\/a><div class=\"wp-block-latest-posts__post-excerpt\">Security Operations Centers (SOCs) thrive on metrics to operate efficiently, benchmark performance, and drive continual improvement. However, one of the most significant challenges many SOCs face is collecting and generating meaningful metrics. Why Are SOC Metrics Crucial? Metrics in the SOC serve several critical functions: Proposed Metrics for SOC Performance To enhance cohesion and performance, consider tracking metrics to which\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/digisentinel.org\/index.php\/2025\/04\/27\/the-importance-of-metrics-in-a-security-operations-center-soc\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: The Importance of Metrics in a Security Operations Center (SOC)<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/digisentinel.org\/index.php\/2023\/10\/04\/harnessing-ai-in-cybersecurity-annex-slides\/\">Harnessing AI in Cybersecurity &#8211; Annex Slides<\/a><div class=\"wp-block-latest-posts__post-excerpt\">These additional slides were created as part of one of our classes to complement the class slides I&#8217;ll cover the story below a little bit in class. The Rise and Rapid Fall of Microsoft&#8217;s Tay In the early months of 2016, the digital corridors of Twitter were abuzz with conversations spanning every conceivable topic. Sensing an opportunity to both tap\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/digisentinel.org\/index.php\/2023\/10\/04\/harnessing-ai-in-cybersecurity-annex-slides\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Harnessing AI in Cybersecurity &#8211; Annex Slides<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/digisentinel.org\/index.php\/2023\/08\/02\/balancing-caution-and-creativity-applying-six-thinking-hats-to-new-ideas\/\">Balancing Caution and Creativity: Applying Six Thinking Hats to New Ideas<\/a><div class=\"wp-block-latest-posts__post-excerpt\">I picked up Edward De Bono&#8217;s book Six Thinking Hats a few years ago. His book presents the idea of categorizing thinking into six categories or Hats. Categorizing Thinking: The Six Thinking Hats Approach Black Hat:&nbsp;Focuses on identifying potential problems, risks, and cautious aspects of an idea or solution. White Hat:&nbsp;Gathering data, information, and facts to understand a situation or\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/digisentinel.org\/index.php\/2023\/08\/02\/balancing-caution-and-creativity-applying-six-thinking-hats-to-new-ideas\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Balancing Caution and Creativity: Applying Six Thinking Hats to New Ideas<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/digisentinel.org\/index.php\/2023\/08\/02\/honeytokens-using-deception-tactics-to-improve-continuous-security-monitoring-efforts-enterprise-information-security\/\">HONEYTOKENS, using deception tactics to improve continuous security monitoring efforts &#8211; Enterprise Information Security<\/a><div class=\"wp-block-latest-posts__post-excerpt\">Introduction Over the years, as information security teams, we have always been on the defense, forever waiting for the next security event before we can act. Although part of our strategy is to anticipate the adversary, we have not truly started to learn from the trends of the adversary to be prepared for the next attack. Below is a proposal\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/digisentinel.org\/index.php\/2023\/08\/02\/honeytokens-using-deception-tactics-to-improve-continuous-security-monitoring-efforts-enterprise-information-security\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: HONEYTOKENS, using deception tactics to improve continuous security monitoring efforts &#8211; Enterprise Information Security<\/span><\/a><\/div><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":34,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_crdt_document":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"footnotes":""},"class_list":["post-54","page","type-page","status-publish","hentry"],"jetpack_shortlink":"https:\/\/wp.me\/Pgs2Ve-S","_links":{"self":[{"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/pages\/54","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/comments?post=54"}],"version-history":[{"count":2,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/pages\/54\/revisions"}],"predecessor-version":[{"id":224,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/pages\/54\/revisions\/224"}],"up":[{"embeddable":true,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/pages\/34"}],"wp:attachment":[{"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/media?parent=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}