top of page
Search
The Importance of Security Architecture in Organizations
Understanding Security Architecture Security architecture is not merely about technology choices. It involves creating a holistic strategy that aligns security capabilities with business objectives, risk tolerance, regulatory requirements, and operational realities. Think of it as the blueprint for how all the pieces fit together. Without this blueprint, an organization may invest significant time and money in isolated security efforts that fail to contribute to meaningful r
Joel Van Dyk
Oct 9


Cybersecurity in Cloud Migration: Key Insights & Strategies
About 10+ years ago, one of my fellow enterprise architects came to me and said, "Joel, would your opinion on the cloud change if I cloud...
Heathrow’s Cyberattack: A Pilot’s View on Grounding Risk and Quantum Security
When Heathrow Airport’s check-in systems went dark this week (September 2025) (see, for instance, https://www.capacitymedia.com/article-c...
Joel Van Dyk
Sep 24
Executive Orders on Cybersecurity — part 1, Quantum
I spent a good amount of time reading the two versions of the Presidential Executive Order on Cybersecurity 14144 from the Biden...
Joel Van Dyk
Jun 19


Why Artificial Intelligence is for Those Who Know How to Ask the Right Questions
The image features a bold, red "ASK" sign, emphasizing the importance of inquiry and curiosity in the realm of artificial intelligence....
Joel Van Dyk
Jan 23


Centralized Controls Assurance
Another day, another 14 point program inspired by a consulting company with project management to make a large checklist of controls that...
Joel Van Dyk
Oct 8, 2024
Security is a process it’s not a checkmark on a checklist
Security is a continuous process of adjustment and improvement as the threat environment changes. I recently read an article in CPO...
Joel Van Dyk
May 16, 2024
A Culture of Security
Many times in my decades of Cybersecurity I’ve been in a place where the Cybersecurity Program is in the skids. The CISO leans over the...
Joel Van Dyk
Mar 5, 2024


Risk Controls Compliance vs Risk Reduction
Risk Controls Compliance and Risk Reduction are 2 fundamental concepts in CyberSecurity. You can have the first without a lot of the 2nd,...
Joel Van Dyk
Dec 7, 2023
Lessons from the field: who should the CISO report to?
It’s spring (officially anyway), and everyone trots out the organizational article, who should the CISO report to? Besides being fun,...
Joel Van Dyk
Mar 23, 2023
How Risk should be measured in a Big Cybersecurity Dept
For the first article of the year I wanted to take a big picture approach. It’s often been said that the Cybersecurity department...
Joel Van Dyk
Mar 2, 2023
Notes from the field: Are you comfortable? Or a bad way to measure risk
I often hear this in meetings where we discuss risk. “Are you comfortable?” I always feel like answering: yes, I’m working from home,...
Joel Van Dyk
Nov 2, 2022
Where the rubber hits the road: Risk acceptance vs Risk Exception
One of the things you regularly get involved in as a CyberSec practitioner (sometimes several times a day) is an implementation of a...
Joel Van Dyk
Sep 29, 2022
Notes from the field: Jetbrains, Trust, and software
Widely Used Software Company May Be Entry Point for Huge U.S. Hacking (Published 2021) ( https://www.nytimes.com/2021/01/06/us/politics/r...
Joel Van Dyk
May 11, 2022
Third Party Risk or How to get your vendor to do NIST
I’ve been coming across this with many 3rd party outsourced relationships. This is why there is so much risk in 3rd party relationships....
Joel Van Dyk
Oct 14, 2021
HSMs and why being compliant is not secure
Data from companies, governments, and people are becoming less contained. You can find data from each of these on public, private and...
Joel Van Dyk
Jul 29, 2021
Still scamming
We have such great tools to solve problems that befuddled us 20 years ago that we sometimes forget the basics. But, the basics, like...
Joel Van Dyk
Jul 1, 2021
Uncertainty, Measuring CyberSecurity and Heisenberg
“The Concept of Measurement As far as the propositions of mathematics refer to reality, they are not certain; and as far as they are...
Joel Van Dyk
May 26, 2021


The Cost of a Breach
Last week I posted on the accelerating frequency and size of breaches and their effect, or lack thereof, on CyberSecurity employment and...
Joel Van Dyk
May 13, 2021


Cyberpay, CyberBreaches, CyberRisk, Cyberskills shortage, and Economics
At the beginning of the month I found this very interesting report “2021 US Cybersecurity Salary & Employment Study”...
Joel Van Dyk
May 5, 2021
bottom of page