stubbornciso.com

stubbornciso.comstubbornciso.comstubbornciso.com

stubbornciso.com

stubbornciso.comstubbornciso.comstubbornciso.com
  • Home
  • Services
  • Cases
  • Cyber Mojo
  • Research
  • More
    • Home
    • Services
    • Cases
    • Cyber Mojo
    • Research

  • Home
  • Services
  • Cases
  • Cyber Mojo
  • Research

About stubbornciso.com

Policies

Speaking at Conferences

Speaking at Conferences

 Cybersecurity policies are the existential treatises of the digital age – dense, theoretical, and guaranteed to make you question your actions and memory when doing something wrong... But hold onto your bootstraps, comrades in the fight against the digital shadows! There's a path less traveled. Let's go forth, enlightened warriors, and c

 Cybersecurity policies are the existential treatises of the digital age – dense, theoretical, and guaranteed to make you question your actions and memory when doing something wrong... But hold onto your bootstraps, comrades in the fight against the digital shadows! There's a path less traveled. Let's go forth, enlightened warriors, and conquer the cyber realm, one clear and concise security principle at a time! 

Speaking at Conferences

Speaking at Conferences

Speaking at Conferences

 Presenting at conferences can feel like navigating a zero-trust network, a la "The Raw and the Cooked" by Claude Lévi-Strauss. You've meticulously patched and updated your research (the cooked), ensuring its integrity and defense against vulnerabilities. But the raw element lies in the audience. Will they be authorized users with legitim

 Presenting at conferences can feel like navigating a zero-trust network, a la "The Raw and the Cooked" by Claude Lévi-Strauss. You've meticulously patched and updated your research (the cooked), ensuring its integrity and defense against vulnerabilities. But the raw element lies in the audience. Will they be authorized users with legitimate intentions, or will malicious actors lurk within? Will your delivery be a secure connection, or riddled with exploits? 

Our Services

Speaking at Conferences

Our Services

Suspicious links? You should see our suspicious prices... Like any vendor in cyber Security - it is tailored to your image...

"Privacy? A decadent dream! Good Prices? A wolf in sheep's clothing! Transparency? The ultimate Übermensch wears a blindfold!"


StubbornCISO

Good references

csoonline

https://www.csoonline.com/

CSO was launched in 2002  

cisoplatform

https://www.cisoplatform.com/

Gartner CISO

https://www.gartner.com/en/cybersecurity/products/gartner-for-cisos

Forrester CISO

https://www.forrester.com/blogs/category/ciso-chief-information-security-officer/

CIO DIVE Leadership

https://www.ciodive.com/topic/leadership-and-careers/

Security Intelligence CISO tag

https://securityintelligence.com/tag/ciso/

Reddit CISO

https://www.reddit.com/r/ciso/

Ciso-jobs-weekly-updates

https://www.linkedin.com/newsletters/ciso-jobs-weekly-updates-7154188385975226368/

Good Podcasts

https://www.youtube.com/@drericcole


https://thecyberranchpodcast.podbean.com/


https://cisoseries.com/category/podcast/ciso-series-podcast/


https://thegrumpyciso.com/category/articles/


https://www.pivotpointsecurity.com/the-virtual-ciso-podcast/


  • Services
  • Cases
  • Cyber Mojo

stubbornciso.com

Copyright © 2025 stubbornciso.com - All Rights Reserved.

Powered by

This website uses cookies.

Cookies exist to collect your info and be used later...

Accept