I’ve been invited to help design a graduate course on Agile in Design Thinking @ IIT’s Institute of Design.
Here’s a friendly list of DO’s and DON’Ts to help protect you and yours this holiday season. Please – check it twice!
It’s fair to say that many of us, especially in the States, don’t know or much care about where our food comes from. That’s unfortunate enough but what even less people may be aware of is how cool farming cultures are. Farmers survive by quickly learning how to do many things when they need to…
WIMZKL is a proud sponsor of this year’s 10 Second Film Festival on behalf of Evanston’s District 65 Green Teams supporting sustainability awareness + education in our schools + community to help foster the next generation of environmental stewards. Watch some of this year’s favorite entries.
The Resilience Diagnostic defines, prioritizes, and quickly identifies practical, concrete steps to eliminate preventable risks across your organization. We require 40-60 hours to achieve this, depending on the complexity of your operation.
What you may not understand about Cyber Insurance, even if you already have some, can cost you more than risking not having any at all. There is a shift underway that impacts business + reputation when cyber incidents take place, beyond even GDPR. Please make time to read this.
Organizations are all working hard in collaboration to bring Atlanta’s critical systems back online but there is still a tremendous amount of work to be done and some serious lessons to be learned.
Heaps of gratitude to Dawid Balut, Mattia Campagnano, Kimber Dowsett, Chris Roberts + Georgia Weidman for sharing their well-grounded thoughts on an often polarizing topic.
I recently assembled + moderated a global panel of experts from Europe, Canada + the US to discuss Information Security for startups + small/medium-sized businesses.
Resilience is being prepared to respond to unplanned events of all kinds, having a plan to manage those events in effective ways to protect your reputation + bottom line. Here’s some tips for how to design your Resilience Strategy.
The General Data Protection Regulation goes into effect on May 25 this year, introducing the biggest change to data protection law in Europe in more than 20 years. What does it mean for businesses in the U.S.?
Protect your identity and privacy on Facebook by learning to detect fakery. Is that a word? It is now.
Resilience Strategy can only truly be tested during and in the hours, days, and weeks following a cyber attack, simulations can help define its strengths + weaknesses prior to an attack in quantifiable ways, saving precious time, money, resources, and reputations. It also builds less quantifiable things like trust, morale, and confidence.
“Free WiFi! Let’s connect to it! Awesome!” But is it? Let’s take a closer look at why there is more to consider.
Beware of links, especially shortened links and especially this time of year Don’t just click on the link! (Especially this time of year). Keep these ideas in mind next time you’re about to click on some random link you got over social media or email.
Cyber Resilience Strategy is not a nice-to-have. The illusion of Cyber Security is gone. Cyber Security incidents will disrupt your business. As leaders, we’re responsible to do business confidently knowing that, when Cyber Security events disrupt our business, our teammates, partners, and clients can count on us to lead the way through.
Learn about DMARC and vastly reduce the chance of you or your team getting a phishing attack in your inbox.
It’s important for us to understand the implications of the Equifax breach and ways to protect our identities. What options are best? Experts on the subject suggest freezing our credit. What does that mean? What does it involve and what do we need to know?
WIMZKL was recently engaged in a forensic investigation. The biggest lesson? Teams that aren’t balancing their defensive practice with offensive fluency, and frequently testing their own defenses, will be no match for attackers who are iterating, evolving and learning exponentially faster.
IBM’s Threat Intelligence Index verifies that humans are still the weakest links within organizations and play the major role in making cyberattacks successful. How do we help turn this around by transforming them from our weakest links into our greatest assets for protecting our organizations against cyberattacks?