Perfect Cybersecurity Manager
  • Welcome
    • About Me
    • Approach
    • Consulting Rates
    • Other Services
    • Contacts
  • Hire a Cybersecurity Manager
    • Common Hiring Mistakes
    • Cybersecurity Leadership Competency Model
    • Hiring Tools & Templates
  • Become a Cybersecurity Manager
    • Top Certifications for Cybersecurity Leadership
    • Recommended Certification Path for Future Cybersecurity Leaders
    • Career Progression Map
  • Managerial vs. Technical
    • You are a techie
    • Your are a manager
    • Does Managing Cybersecurity Require Understanding Technology?
  • Common Disillusions
  • Test yourself
    • How to create a password purely in your head?
    • We decide not to store personal data: is it threat or risk avoidance?
    • How important is a robots.txt file for cybersecurity?
    • Does BitLocker protect data at rest and/or in transit?
    • Are passwords stored in web browsers safe?
    • Would you allow your admins to use Kali-based tools?
    • Does GDPR explicitly require passwords to be protected?
    • Tags summary

Tags page

     
  • manager
  •  
  • techie
  •  
  • Publii

2025 © Ars Nitidus