Menu
Welcome
About Me
Approach
Consulting Rates
Other Services
Contacts
Hire a Cybersecurity Manager
Common Hiring Mistakes
Cybersecurity Leadership Competency Model
Hiring Tools & Templates
Become a Cybersecurity Manager
Common Disillusions
Top Certifications for Cybersecurity Leadership
Recommended Certification Path for Future Cybersecurity Leaders
Career Progression Map
Managerial vs. Technical
You are a techie
Your are a manager
Does Managing Cybersecurity Require Understanding Technology?
Knowledge, Skills, Abilities
How to create a password purely in your head?
We decide not to store personal data: is it threat or risk avoidance?
How important is a robots.txt file for cybersecurity?
Does BitLocker protect data at rest and/or in transit?
Are passwords stored in web browsers safe?
Would you allow your admins to use Kali-based tools?
Does GDPR explicitly require passwords to be protected?
Your security scan crashed a server
Internal audit questions the quality of antimalware
From A Cost Centrum To A Business-Savvy Peer
Your guide to
The Perfect Cybersecurity Manager
All
auditing
encryption
GDPR
ISO-27001
manager
network
review
risks
scans
techie
web
We decide not to store personal data: is it threat or risk avoidance?
December 15, 2025
How to create a password purely in your head?
December 15, 2025
The Right Blend
December 8, 2025
You Are a Managerial Type
December 8, 2025
You Are a Technical Type
December 8, 2025
Next