Cybersecurity Leadership-Overview

The Cybersecurity Leadership Overview is similar to this page in that it provides an overview of the primary sections of this collection of pages. All related content is focused on CSO/CISO/BISO/TISO/ISO concerns and should not be viewed as a conversation on skills. These are the things that keep Cybersecurity Leaders up at night, but they are also collected into domains because no one person can keep all this information inside their head.

Cybersecurity Leadership-High-Level Concerns

The Cybersecurity Leadership High-Level Concerns starts the conversation on the high-level domains a cybersecurity leader is concerned with. These domains are addressed at a high-level and then expanded into more detail within the other pages.

Cybersecurity Leadership-Governance

This expanded domain of the Cybersecurity Leadership Concerns is focused solely on governance.

Cybersecurity Leadership-Mergers and Acquisition

This expanded domain of the Cybersecurity Leadership Concerns is focused solely on mergers and acquisitions but also considers divestitures.

Cybersecurity Leadership-Project Delivery

This expanded domain of the Cybersecurity Leadership Concerns is focused solely on project delivery.

Cybersecurity Leadership-Cybersecurity Architecture

This expanded domain of the Cybersecurity Leadership Concerns is focused solely on cybersecurity architecture.


Cybersecurity Leadership- Cybersecurity Operations

This expanded domain of the Cybersecurity Leadership Concerns is focused solely on cybersecurity operations (CSOC). This distinction is made to avoid overlap with physical security operations, which may also be referred to as a SOC.

Cybersecurity Leadership-Physical Security Operations

This expanded domain of the Cybersecurity Leadership Concerns is focused solely on physical security operations.

Cybersecurity Leadership-Governance, Risk, Compliance (GRC)

This expanded domain of the Cybersecurity Leadership Concerns is focused solely on governance, risk, and compliance, although GRC is generally the realm of Enterprise Risk Management.




As a working cybersecurity professional, every attempt is made to separate professional and personal endeavors in a manner consistent with reducing conflicts of interest and maintaining ethics. Statements contained within this site are the explicit and implicit goals, objectives, endorsements, and educated opinion of the author of this site and not those of current or former employers.


Image
© 2025 James J. Fisher, All Rights Reserved. Contact Me


This site only uses session cookies for maintaining the state of each page. Users are not tracked, and information is not stored, processed, or analyzed for any other purpose. However, third parties linked to this site may use tracking cookies and techniques outside of the realm of control for this site.