• About TC
  • Affiliate Disclaimer
  • Privacy Policy
  • TOS
  • Contact
Thursday, June 19, 2025
Techcratic
  • TC
  • AI
    Artificial Intelligence

    Building a custom text-to-SQL agent using Amazon Bedrock and Converse API

    Artificial Intelligence

    How Apollo Tyres is unlocking machine insights using agentic AI-powered Manufacturing Reasoner

    Artificial Intelligence

    Automatically Build AI Workflows with Magical AI

    Artificial Intelligence

    Amazon Nova Lite enables Bito to offer a free tier option for its AI-powered code reviews

    Artificial Intelligence

    Bridging the Gap: New Datasets Push Recommender Research Toward Real-World Scale

    Artificial Intelligence

    7 Python Errors That Are Actually Features

    Artificial Intelligence

    10 Awesome OCR Models for 2025

    Artificial Intelligence

    5 Error Handling Patterns in Python (Beyond Try-Except)

    Artificial Intelligence

    Top 5 Alternative Data Career Paths and How to Learn Them for Free

  • Crypto
    Best Presales to Buy Today – Which Coins Are Poised for a Breakout?

    DOGE, SOL, and XRP Holders Can Now Cash Out Through BCC Mining

    China’s Central Bank Governor Envisions the End of US Dollar Dominance

    China’s Central Bank Governor Envisions the End of US Dollar Dominance

    K33 Plans Major Bitcoin Acquisition With $8 Million Share Issue

    K33 Plans Major Bitcoin Acquisition With $8 Million Share Issue

    Bitcoin Bull Cycle is Over: CryptoQuant CEO

    Trump Wants GENIUS Bill Sent Straight to His Desk, Without Delay

    Ripple and SEC Press Judge Torres to Approve Settlement Ending XRP Case

    Ripple and SEC Press Judge Torres to Approve Settlement Ending XRP Case

    The World’s Most Dangerous Bond? Analyst Sounds the Alarm on Japan’s 40-Year JGB Market

    The World’s Most Dangerous Bond? Analyst Sounds the Alarm on Japan’s 40-Year JGB Market

    Uniswap Surges 24% on $88B Volume, Targeting $12

    Chinese Bitcoin Hardware Titans Hold 95% Market, Shift to US

    DDC Raises $528 Million to Buy BTC After Losing Money for at Least Four Years in a Row

    DDC Raises $528 Million to Buy BTC After Losing Money for at Least Four Years in a Row

    Best Presales to Buy Today – Which Coins Are Poised for a Breakout?

    How to Earn Daily Rewards Using Cutting-Edge Cloud Mining Platform BCC Mining?

  • Cybersecurity
    Cybersecurity

    Meta Adds Passkey Login Support to Facebook for Android and iOS Users

    Cybersecurity

    FedRAMP at Startup Speed: Lessons Learned

    Cybersecurity

    CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

    Cybersecurity

    Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

    Cybersecurity

    Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

    Cybersecurity

    Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments

    Cybersecurity

    AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

    Cybersecurity

    How to Address the Expanding Security Risk

    Cybersecurity

    ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

  • Deals
    Logitech C920x HD Pro Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light…

    Logitech C920x HD Pro Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light…

    Lexar 128GB (2-Pack) Professional 1667x SD Card, UHS-II, C10, U3, V60, Full HD, 4K, Up…

    Lexar 128GB (2-Pack) Professional 1667x SD Card, UHS-II, C10, U3, V60, Full HD, 4K, Up…

    Charger for Lenovo Laptop – Ideapad 3 1 5 S340 S145 330 320 310, Flex 5, V14 V15 V17,…

    Charger for Lenovo Laptop – Ideapad 3 1 5 S340 S145 330 320 310, Flex 5, V14 V15 V17,…

    Kingston 240GB A400 SATA 3 2.5″ Internal SSD SA400S37/240G – HDD Replacement for…

    Kingston 240GB A400 SATA 3 2.5″ Internal SSD SA400S37/240G – HDD Replacement for…

    Intel Core i7-12700K Gaming Desktop Processor with Integrated Graphics and 12 (8P+4E)…

    Intel Core i7-12700K Gaming Desktop Processor with Integrated Graphics and 12 (8P+4E)…

    EVGA 24G-P5-3975-KR GeForce RTX 3090 XC3 Ultra Gaming, 24GB GDDR6X, iCX3 Cooling, ARGB…

    EVGA 24G-P5-3975-KR GeForce RTX 3090 XC3 Ultra Gaming, 24GB GDDR6X, iCX3 Cooling, ARGB…

    CORSAIR VENGEANCE LPX DDR4 RAM 64GB (2x32GB) 3600MHz CL18-22-22-42 1.35V Intel AMD…

    CORSAIR VENGEANCE LPX DDR4 RAM 64GB (2x32GB) 3600MHz CL18-22-22-42 1.35V Intel AMD…

    ASRock Motherboard B760M-HDV/M.2 Intel 12th and 13th Generation CPU (LGA1700) Compatible…

    ASRock Motherboard B760M-HDV/M.2 Intel 12th and 13th Generation CPU (LGA1700) Compatible…

    2018 Apple iPad Pro (12.9-inch, Wi-Fi, 256GB) – Silver (Renewed)

    2018 Apple iPad Pro (12.9-inch, Wi-Fi, 256GB) – Silver (Renewed)

  • Gaming
    The Legend of Zelda: Breath of the Wild Switch 2 Review – A Bit of a Disappointing Upgrade

    The Legend of Zelda: Breath of the Wild Switch 2 Review – A Bit of a Disappointing Upgrade

    The Truth About Transformers Reactivate

    The Truth About Transformers Reactivate

    Doom: The Dark Ages gets path tracing for even better graphics but unless you’ve got an RTX 50 graphics card, it’s not worth using

    Doom: The Dark Ages gets path tracing for even better graphics but unless you’ve got an RTX 50 graphics card, it’s not worth using

    Grand Theft Auto VI – Official Gameplay Leak (Ultra Graphics)

    Grand Theft Auto VI – Official Gameplay Leak (Ultra Graphics)

    Should You Buy The Last Of Us Part 1? (Review)

    Should You Buy The Last Of Us Part 1? (Review)

    Stray Nintendo Switch Review

    Stray Nintendo Switch Review

    Corsair iCUE Link Titan 360 RX LCD review

    Das Keyboard DeltaForce 65 review

    How to Get the Rare Hisui Ribbon in Pokemon Scarlet and Violet! Pokemon Home Update!

    How to Get the Rare Hisui Ribbon in Pokemon Scarlet and Violet! Pokemon Home Update!

    Zelda Ocarina of Time 3D 100% Walkthrough – Part 47/78 – Big Goron's Sword Part 2 (Commentary)

    Zelda Ocarina of Time 3D 100% Walkthrough – Part 47/78 – Big Goron's Sword Part 2 (Commentary)

  • Tesla
    BestEvMod Center Console Cup Holder Trim Cover Panel Decorative Cover Sticker ABS…

    BestEvMod Center Console Cup Holder Trim Cover Panel Decorative Cover Sticker ABS…

    TUFFIOM 46″x 36″x 6″ Universal Rooftop Cargo Carrier Basket, Heavy Duty Steel Roof Rack…

    TUFFIOM 46″x 36″x 6″ Universal Rooftop Cargo Carrier Basket, Heavy Duty Steel Roof Rack…

    Door Side Rear View Mirror Cover Compatible with 2024 2025 Tesla Cybertruck Accessories

    Door Side Rear View Mirror Cover Compatible with 2024 2025 Tesla Cybertruck Accessories

    4PCS Wheel Center Caps and 24PCS Black Lug nut Covers for Tesla Cybertruck Accessories…

    4PCS Wheel Center Caps and 24PCS Black Lug nut Covers for Tesla Cybertruck Accessories…

    Car Windshield Cleaning Tool, Microfiber Window Cleaner with 4 Washable and Reusable…

    Car Windshield Cleaning Tool, Microfiber Window Cleaner with 4 Washable and Reusable…

    Rear Under Seat Storage Truck Tool Box Organizer for Tesla Cybertruck 2024 2025…

    Rear Under Seat Storage Truck Tool Box Organizer for Tesla Cybertruck 2024 2025…

    Fast Tesla Charger Level 2 25FT- 40A Portable Mobile EV Charger for Tesla, Wireless…

    Fast Tesla Charger Level 2 25FT- 40A Portable Mobile EV Charger for Tesla, Wireless…

    Custom Fit Tesla Cybertruck 2024 2025 Sunshade Umbrella -100% Blackout Ratio Thickened…

    Custom Fit Tesla Cybertruck 2024 2025 Sunshade Umbrella -100% Blackout Ratio Thickened…

    KEEPER Portable Trunk Organizer, 19L, Car Organizers and Storage, Non-Slip Bottom,…

    KEEPER Portable Trunk Organizer, 19L, Car Organizers and Storage, Non-Slip Bottom,…

  • UFO
    Dimzmars Spacecraft Model Interstellar Prowler Movie Spaceship Model

    Dimzmars Spacecraft Model Interstellar Prowler Movie Spaceship Model

    Scientists Reveal New Mission to Locate Alien Technology Within Our Solar System

    Scientists Reveal New Mission to Locate Alien Technology Within Our Solar System

    Womens Mens Running Shoes Tennis Sneakers Lightweight Gym Slip on Unisex Shoes Athletic Workout Walking Shoes

    Womens Mens Running Shoes Tennis Sneakers Lightweight Gym Slip on Unisex Shoes Athletic Workout Walking Shoes

    Sacred Ark Contains Secret Alien Tech | Ancient Aliens | The UnXplained Zone #shorts

    Sacred Ark Contains Secret Alien Tech | Ancient Aliens | The UnXplained Zone #shorts

    Billy Meier's contact with Semjase

    Billy Meier's contact with Semjase

    Hunter Fan Company 50798 Roswell Indoor Ceiling Fan with Wall Control, 16″, Brushed Nickel Finish

    Hunter Fan Company 50798 Roswell Indoor Ceiling Fan with Wall Control, 16″, Brushed Nickel Finish

    Naughty Dog Sets NEW DISLIKE RECORD | Intergalactic The Heretic Prophet ROASTED Into OBLIVION

    Naughty Dog Sets NEW DISLIKE RECORD | Intergalactic The Heretic Prophet ROASTED Into OBLIVION

    Alien Abduction: Answers [DVD]

    Alien Abduction: Answers [DVD]

    We CAUGHT PARANORMAL ACTIVITY ON CAMERA | Haunted Funeral Home Paranormal Investigation | SCARY

    We CAUGHT PARANORMAL ACTIVITY ON CAMERA | Haunted Funeral Home Paranormal Investigation | SCARY

No Result
View All Result
  • TC
  • AI
    Artificial Intelligence

    Building a custom text-to-SQL agent using Amazon Bedrock and Converse API

    Artificial Intelligence

    How Apollo Tyres is unlocking machine insights using agentic AI-powered Manufacturing Reasoner

    Artificial Intelligence

    Automatically Build AI Workflows with Magical AI

    Artificial Intelligence

    Amazon Nova Lite enables Bito to offer a free tier option for its AI-powered code reviews

    Artificial Intelligence

    Bridging the Gap: New Datasets Push Recommender Research Toward Real-World Scale

    Artificial Intelligence

    7 Python Errors That Are Actually Features

    Artificial Intelligence

    10 Awesome OCR Models for 2025

    Artificial Intelligence

    5 Error Handling Patterns in Python (Beyond Try-Except)

    Artificial Intelligence

    Top 5 Alternative Data Career Paths and How to Learn Them for Free

  • Crypto
    Best Presales to Buy Today – Which Coins Are Poised for a Breakout?

    DOGE, SOL, and XRP Holders Can Now Cash Out Through BCC Mining

    China’s Central Bank Governor Envisions the End of US Dollar Dominance

    China’s Central Bank Governor Envisions the End of US Dollar Dominance

    K33 Plans Major Bitcoin Acquisition With $8 Million Share Issue

    K33 Plans Major Bitcoin Acquisition With $8 Million Share Issue

    Bitcoin Bull Cycle is Over: CryptoQuant CEO

    Trump Wants GENIUS Bill Sent Straight to His Desk, Without Delay

    Ripple and SEC Press Judge Torres to Approve Settlement Ending XRP Case

    Ripple and SEC Press Judge Torres to Approve Settlement Ending XRP Case

    The World’s Most Dangerous Bond? Analyst Sounds the Alarm on Japan’s 40-Year JGB Market

    The World’s Most Dangerous Bond? Analyst Sounds the Alarm on Japan’s 40-Year JGB Market

    Uniswap Surges 24% on $88B Volume, Targeting $12

    Chinese Bitcoin Hardware Titans Hold 95% Market, Shift to US

    DDC Raises $528 Million to Buy BTC After Losing Money for at Least Four Years in a Row

    DDC Raises $528 Million to Buy BTC After Losing Money for at Least Four Years in a Row

    Best Presales to Buy Today – Which Coins Are Poised for a Breakout?

    How to Earn Daily Rewards Using Cutting-Edge Cloud Mining Platform BCC Mining?

  • Cybersecurity
    Cybersecurity

    Meta Adds Passkey Login Support to Facebook for Android and iOS Users

    Cybersecurity

    FedRAMP at Startup Speed: Lessons Learned

    Cybersecurity

    CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

    Cybersecurity

    Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

    Cybersecurity

    Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

    Cybersecurity

    Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments

    Cybersecurity

    AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

    Cybersecurity

    How to Address the Expanding Security Risk

    Cybersecurity

    ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

  • Deals
    Logitech C920x HD Pro Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light…

    Logitech C920x HD Pro Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light…

    Lexar 128GB (2-Pack) Professional 1667x SD Card, UHS-II, C10, U3, V60, Full HD, 4K, Up…

    Lexar 128GB (2-Pack) Professional 1667x SD Card, UHS-II, C10, U3, V60, Full HD, 4K, Up…

    Charger for Lenovo Laptop – Ideapad 3 1 5 S340 S145 330 320 310, Flex 5, V14 V15 V17,…

    Charger for Lenovo Laptop – Ideapad 3 1 5 S340 S145 330 320 310, Flex 5, V14 V15 V17,…

    Kingston 240GB A400 SATA 3 2.5″ Internal SSD SA400S37/240G – HDD Replacement for…

    Kingston 240GB A400 SATA 3 2.5″ Internal SSD SA400S37/240G – HDD Replacement for…

    Intel Core i7-12700K Gaming Desktop Processor with Integrated Graphics and 12 (8P+4E)…

    Intel Core i7-12700K Gaming Desktop Processor with Integrated Graphics and 12 (8P+4E)…

    EVGA 24G-P5-3975-KR GeForce RTX 3090 XC3 Ultra Gaming, 24GB GDDR6X, iCX3 Cooling, ARGB…

    EVGA 24G-P5-3975-KR GeForce RTX 3090 XC3 Ultra Gaming, 24GB GDDR6X, iCX3 Cooling, ARGB…

    CORSAIR VENGEANCE LPX DDR4 RAM 64GB (2x32GB) 3600MHz CL18-22-22-42 1.35V Intel AMD…

    CORSAIR VENGEANCE LPX DDR4 RAM 64GB (2x32GB) 3600MHz CL18-22-22-42 1.35V Intel AMD…

    ASRock Motherboard B760M-HDV/M.2 Intel 12th and 13th Generation CPU (LGA1700) Compatible…

    ASRock Motherboard B760M-HDV/M.2 Intel 12th and 13th Generation CPU (LGA1700) Compatible…

    2018 Apple iPad Pro (12.9-inch, Wi-Fi, 256GB) – Silver (Renewed)

    2018 Apple iPad Pro (12.9-inch, Wi-Fi, 256GB) – Silver (Renewed)

  • Gaming
    The Legend of Zelda: Breath of the Wild Switch 2 Review – A Bit of a Disappointing Upgrade

    The Legend of Zelda: Breath of the Wild Switch 2 Review – A Bit of a Disappointing Upgrade

    The Truth About Transformers Reactivate

    The Truth About Transformers Reactivate

    Doom: The Dark Ages gets path tracing for even better graphics but unless you’ve got an RTX 50 graphics card, it’s not worth using

    Doom: The Dark Ages gets path tracing for even better graphics but unless you’ve got an RTX 50 graphics card, it’s not worth using

    Grand Theft Auto VI – Official Gameplay Leak (Ultra Graphics)

    Grand Theft Auto VI – Official Gameplay Leak (Ultra Graphics)

    Should You Buy The Last Of Us Part 1? (Review)

    Should You Buy The Last Of Us Part 1? (Review)

    Stray Nintendo Switch Review

    Stray Nintendo Switch Review

    Corsair iCUE Link Titan 360 RX LCD review

    Das Keyboard DeltaForce 65 review

    How to Get the Rare Hisui Ribbon in Pokemon Scarlet and Violet! Pokemon Home Update!

    How to Get the Rare Hisui Ribbon in Pokemon Scarlet and Violet! Pokemon Home Update!

    Zelda Ocarina of Time 3D 100% Walkthrough – Part 47/78 – Big Goron's Sword Part 2 (Commentary)

    Zelda Ocarina of Time 3D 100% Walkthrough – Part 47/78 – Big Goron's Sword Part 2 (Commentary)

  • Tesla
    BestEvMod Center Console Cup Holder Trim Cover Panel Decorative Cover Sticker ABS…

    BestEvMod Center Console Cup Holder Trim Cover Panel Decorative Cover Sticker ABS…

    TUFFIOM 46″x 36″x 6″ Universal Rooftop Cargo Carrier Basket, Heavy Duty Steel Roof Rack…

    TUFFIOM 46″x 36″x 6″ Universal Rooftop Cargo Carrier Basket, Heavy Duty Steel Roof Rack…

    Door Side Rear View Mirror Cover Compatible with 2024 2025 Tesla Cybertruck Accessories

    Door Side Rear View Mirror Cover Compatible with 2024 2025 Tesla Cybertruck Accessories

    4PCS Wheel Center Caps and 24PCS Black Lug nut Covers for Tesla Cybertruck Accessories…

    4PCS Wheel Center Caps and 24PCS Black Lug nut Covers for Tesla Cybertruck Accessories…

    Car Windshield Cleaning Tool, Microfiber Window Cleaner with 4 Washable and Reusable…

    Car Windshield Cleaning Tool, Microfiber Window Cleaner with 4 Washable and Reusable…

    Rear Under Seat Storage Truck Tool Box Organizer for Tesla Cybertruck 2024 2025…

    Rear Under Seat Storage Truck Tool Box Organizer for Tesla Cybertruck 2024 2025…

    Fast Tesla Charger Level 2 25FT- 40A Portable Mobile EV Charger for Tesla, Wireless…

    Fast Tesla Charger Level 2 25FT- 40A Portable Mobile EV Charger for Tesla, Wireless…

    Custom Fit Tesla Cybertruck 2024 2025 Sunshade Umbrella -100% Blackout Ratio Thickened…

    Custom Fit Tesla Cybertruck 2024 2025 Sunshade Umbrella -100% Blackout Ratio Thickened…

    KEEPER Portable Trunk Organizer, 19L, Car Organizers and Storage, Non-Slip Bottom,…

    KEEPER Portable Trunk Organizer, 19L, Car Organizers and Storage, Non-Slip Bottom,…

  • UFO
    Dimzmars Spacecraft Model Interstellar Prowler Movie Spaceship Model

    Dimzmars Spacecraft Model Interstellar Prowler Movie Spaceship Model

    Scientists Reveal New Mission to Locate Alien Technology Within Our Solar System

    Scientists Reveal New Mission to Locate Alien Technology Within Our Solar System

    Womens Mens Running Shoes Tennis Sneakers Lightweight Gym Slip on Unisex Shoes Athletic Workout Walking Shoes

    Womens Mens Running Shoes Tennis Sneakers Lightweight Gym Slip on Unisex Shoes Athletic Workout Walking Shoes

    Sacred Ark Contains Secret Alien Tech | Ancient Aliens | The UnXplained Zone #shorts

    Sacred Ark Contains Secret Alien Tech | Ancient Aliens | The UnXplained Zone #shorts

    Billy Meier's contact with Semjase

    Billy Meier's contact with Semjase

    Hunter Fan Company 50798 Roswell Indoor Ceiling Fan with Wall Control, 16″, Brushed Nickel Finish

    Hunter Fan Company 50798 Roswell Indoor Ceiling Fan with Wall Control, 16″, Brushed Nickel Finish

    Naughty Dog Sets NEW DISLIKE RECORD | Intergalactic The Heretic Prophet ROASTED Into OBLIVION

    Naughty Dog Sets NEW DISLIKE RECORD | Intergalactic The Heretic Prophet ROASTED Into OBLIVION

    Alien Abduction: Answers [DVD]

    Alien Abduction: Answers [DVD]

    We CAUGHT PARANORMAL ACTIVITY ON CAMERA | Haunted Funeral Home Paranormal Investigation | SCARY

    We CAUGHT PARANORMAL ACTIVITY ON CAMERA | Haunted Funeral Home Paranormal Investigation | SCARY

No Result
View All Result
Techcratic
No Result
View All Result
Home Hacker News

Your First 90 Days as Security Lead, Part 2: Developing a Plan and Getting to Work

Hacker News by Hacker News
February 10, 2025
in Hacker News
Reading Time: 11 mins read
122 8
A A
0

johnk
2019-01-14 08:27:00
www.hackerone.com

You’ve just been named as your organization’s new head of security. So what do you do first? Read part one of this series, “Building Your Security Foundation”, then come back here to continue.

At this stage, your mind is probably flooded with things to do and potential places to begin. That’s all great information to parse, but there are a few areas where you should focus as you get underway. Start by understanding the current situation, then working with users to get their perspective, and surveying other leaders to be better prepared for where your organization wants to be in the future. With that information, you’re best equipped put your plan into action.

Determine today’s baseline

Two men solve a problem at a computer

One of your first tasks should be to assess your current security measures to really understand your broader security stance rather than trying to react to every incoming issue. That means talking with your security team as well as with developers, engineers, legal, finance, HR, marketing, compliance, and others to understand their view of risks and threats facing your organization. By asking questions about past incidents, close calls, mistakes, and lessons learned, plus observing past decisions and actions, you’ll be better able to develop a risk framework and prioritizations. 

During these interviews, you’ll also have a chance to position risk as a thing to manage, not a thing to eliminate. For example, you can eliminate any risk of a data breach by deleting all of your data. But that’s just silly. Customers and workers need access to that data. So how do you manage the risk? By giving access to the people who need the data while protecting it from those who don’t.

The point is that your data and technologies have to be accessed, so they are, at least in some respects, open. Your security approach should be open as well. Hiding the risks—security through obscurity—does nothing to help mitigate them, and even those outside of your security team may have ideas and options to consider. Developers and engineers need to know the risks in order to help mitigate them at the base code levels. Also, everyone should be encouraged to consider security, so actively engaging with them now gives them more incentive to participate if you need them to later.

It’s crucial to evaluate the severity and criticality of the security landscape since you need to know what you’re protecting before you can protect it. These conversations precede an asset inventory, where you identify everything in your purview—hardware, software, cloud services, access points, users, and so on. Then, look at the processes involved with provisioning, maintaining, procuring, and using those systems. Also look at current vulnerability management processes, such as how incoming bug reports are managed (if at all) and how disclosure is handled. 

This all sparks further conversations with infrastructure engineers, architects, IT, developers, and others. At all times, remember that you’re not there to place blame, you’re there to provide solutions.

Once you begin to understand the assets and the processes, you’ll spark new conversations on how your apps are developed, how bugs are reported and fixed, how products are released, how updates are disseminated, how user accounts are provisioned, and more. It will open a new level of collaboration between security and the rest of the organization, all aimed at reducing risk and developing solutions early rather than after the fact.

Your goal here is to change the conversation by having conversations. The openness you display around security can shift how your organization approaches the entire topic. You’ll never eliminate all of the cybersecurity risks, but by being transparent and open, you’ll be better prepared to manage and respond to any future threats.

Walk the user’s walk 

Man works at computer

Up to this point, you’ve taken an internal approach, working with developers and internal stakeholders for an inside-out perspective. In your first 90 days, it’s critical to also look at security from the user’s perspective, and that means both employees and customers. 

For example, have IT walk you through the process of provisioning a new employee with accounts, passwords, hardware, etc. Then, pretend you’re a new customer and do the same, from first marketing interaction of gathering contact information to entering credit card numbers to understanding access, passwords, administration, and data flow. 

External assessments can play a part here as well. Bug bounty programs, penetration tests, scans, and vulnerability disclosure policies can identify bugs and potential issues from the perspective of those outside your organization. They provide a means for uncovering issues in areas or with techniques you may not have considered.

It’s an involved process, to be sure, but taking these steps can identify even more security gaps and areas of focus as you put together your plan. 

Look to tomorrow

The trajectory of your organization is, from your perspective, more important than the status quo. As you build or adjust your team, that trajectory will define which roles and skills you need, how much budget is required, where processes need to be defined or reworked, and what tools or techniques need to be replaced or added. 

During your conversations with stakeholders, talk about future needs and fears. Legal and compliance might have insight into future regulatory concerns, while marketing may be worried about the positioning of security towards a certain market. 

As new projects or products are developed, get involved early and partner with development teams by helping them apply the appropriate security practices. Then, as everyone becomes more comfortable, migrating existing products will be both easier and more understandable. 

Get to work implementing your plan

Two men at computer work through a possible security threat

You’ve been the head of security for a couple of months, so now it’s time to put a plan in place and get to work. But where do you focus your efforts and which threats should you prioritize? 

Remember that any security threat is also a business threat. Aligning your team to business priorities is important, as is framing your security strategy in business terms. For example, talking to your executives about patch management will elicit yawns. But the conversation becomes vastly more interesting when you explain that a breach in a specific area by a specific threat would impact key business goals. It also puts the importance in terms most business leaders understand: revenue.

Prioritize your threat landscape

Threat modeling is a way to identify and prioritize potential security threats. It gives you a criminal’s view of your organization, identifies weak spots, and lets you get to work hardening those gaps. A threat might be based on the security gap in your technologies or the assets at risk from a gap or a combination of the two. Whatever your methodology (and many are available), it’s a logical way to set your security strategy early on.

Further external assessments, such as bug bounty programs, can also highlight areas where threats are more likely. Maybe a compromised technology was used in various apps across your business. You might not even be aware, but independent white hat hackers will quickly identify such a gap. 

This is where good risk management comes into play and works to save your company money. Incorporating a financial aspect to your prioritization also puts it in terms others will easily understand. For example, penalties for a breach to customer data are likely more impactful than breaches to, say, product information. So if a specific risk is projected to cost $10,000 if exploited, but a fix would cost $50,000, it would have a low priority.

By modeling those threats, and their potential impact, you’ll build a picture of your most sensitive areas and gaps. This is how your understanding of your threat landscape informs your strategy and priorities going forward. 

Develop your priorities

At this point, your prioritized list of projects should be apparent and point to items that are critical to your brand or your organization’s livelihood. These priorities cannot be developed within your team alone, however. Your early conversations can help inform the prioritization, but collaboration at this point is important so you can understand the impact of the priorities. Maybe development and engineering don’t have the resources to work on something you deem as critical. Maybe compliance and legal, or even marketing, have different ways to measure prioritizations. 

Collaboration is key, especially since many of the fixes will be the responsibility of other teams. Furthermore, effective planning gives these teams enough time to weave security priorities into their own long list of projects. It also builds goodwill across the organization by helping to reduce frustrating fire drills.

Share your knowledge

As you get to work, you’ll undoubtedly seek advice and knowledge from other parties outside of your organization. Part of the paradigm shift from the fortress to the airport model of security is also in external transparency. It benefits you, and it’s a two-way street. Every company, even competitors, need to collaborate on threats and solutions. When we share knowledge, we all become better at identifying and counteracting threat actors and attack trends. 

Many industry organizations are taking the lead on this front, such as Auto-ISAC and FS-ISAC, while government agencies, from the Federal Trade Commission to the Food & Drug Administration to the European Commission, are also offering advice and guidance. Their transparency helps you, so please consider being transparent yourself.

Another positive result of transparency is the MITRE ATT&CK knowledge base. It provides a framework for describing the behavior of attackers and can help organizations understand their defense capabilities. It’s also a great resource for threat modeling, especially for organizations new to the practice. 

HackerOne also provides a public view of “hacktivity”, where the details of disclosed vulnerability reports are available for all to see and learn from. While some of our customers redact the finer details, many others provide full disclosure, including communications between internal security teams and the reporting hacker, as well as the awarded bounty value, vulnerability categorization, and more.

Keep your eye on the prize

Remember that you’ve just begun your first 90 days as the security lead. You’ll obviously want to show progress (and areas of improvement) over the next several quarters and years, so the baseline you develop today will give you a set of benchmarks against which you can measure progress over the coming months. 

Also, remember that you’ll never eliminate all threats, you’ll just change the threat landscape by mitigating some as criminals open up others. Your job is to reduce security risks. Only by being a vocal participant in your organization (and in your industry) will you be effective at your new job. 

The cybersecurity landscape has changed drastically over the past few years. Secrecy has been replaced by transparency, and for every company outed for their highly-preventable security gaps, many other organizations have chosen to proactively share information and build a more secure environment for everyone. By taking an open, collaborative approach to security, both internally and externally, you’re giving yourself a better chance at success. 

Contact Us to learn how HackerOne can help.

Best of luck! 


HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.

Source Link


Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.

Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!


Start your free Amazon Prime trial
today and unlock unlimited streaming and more!

Help Power Techcratic’s Future – Scan To Support

If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.

As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!

BITCOIN

Bitcoin Logo

Bitcoin QR Code

bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge

Scan the QR code with your crypto wallet app

DOGECOIN

Dogecoin Logo

Dogecoin QR Code

D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA

Scan the QR code with your crypto wallet app

ETHEREUM

Ethereum Logo

Ethereum QR Code

0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a

Scan the QR code with your crypto wallet app

Please read the Privacy and Security Disclaimer on how Techcratic handles your support.

Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.

Tags: Hacker News
Share162ShareTweet101
Previous Post

World’s Thinnest Foldable Phone Launches Next Week

Next Post

Oppo teaser reveals Find N5 full design and Feb 20 launch, leaks confirm colors and specs

Hacker News

Hacker News

Stay updated with Hacker News, where technology meets entrepreneurial spirit. Get the latest on tech trends, startup news, and discussions from the tech community. Read the latest updates here at Techcratic.

Related Posts

elliptic-curves.art
Hacker News

elliptic-curves.art

June 19, 2025
1.3k
lunchbox-computer/bento: a computer in a keyboard
Hacker News

lunchbox-computer/bento: a computer in a keyboard

June 18, 2025
1.3k
Framework Laptop 12 review: I’m excited to see what the 2nd generation looks like
Hacker News

Framework Laptop 12 review: I’m excited to see what the 2nd generation looks like

June 18, 2025
1.3k
montyanderson/incant: Add magic spells to your code.
Hacker News

montyanderson/incant: Add magic spells to your code.

June 18, 2025
1.3k
SparcLab/OpenSERDES: Digitally synthesizable architecture for SerDes using Skywater Open PDK 130 nm technology.
Hacker News

SparcLab/OpenSERDES: Digitally synthesizable architecture for SerDes using Skywater Open PDK 130 nm technology.

June 18, 2025
1.3k
bgreenwell/lstr: A fast, minimalist directory tree viewer, written in Rust.
Hacker News

bgreenwell/lstr: A fast, minimalist directory tree viewer, written in Rust.

June 17, 2025
1.3k
Time Series Forecasting with Graph Transformers
Hacker News

Time Series Forecasting with Graph Transformers

June 17, 2025
1.3k
ku9nov/faynoSync: Simple Auto Updater service written in Golang.
Hacker News

ku9nov/faynoSync: Simple Auto Updater service written in Golang.

June 17, 2025
1.3k
Load More
Next Post
Smartphone

Oppo teaser reveals Find N5 full design and Feb 20 launch, leaks confirm colors and specs

Your Tech Resources

  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • Forbes
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo
  • Google News
  • Hacker News
  • Harvard Tech
  • I Like Cats ™
  • I Like Dogs ™
  • LifeHacker
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • PC World
  • Photofocus
  • Physics
  • Random Tech
  • Retro Rewind ™
  • Robot Report
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Art
  • Tech Careers
  • Tech Deals
  • Techcratic ™
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Tech News

  • 30 Second Tech ™
  • AI
  • Apple Insider
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • ExtremeTech
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo

Tech News

  • Harvard Tech
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • Physics
  • PC World
  • Random Tech
  • Retro Rewind ™
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Careers

Tech News​

  • Tech Art
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Site Links

  • About Techcratic
  • Affiliate Disclaimer
  • Affiliate Link Policy
  • Contact Techcratic
  • Dealors Discount Store
  • Privacy and Security Disclaimer
  • Privacy Policy
  • RSS Feed
  • Site Map
  • Support Techcratic
  • Techcratic
  • Tech Deals
  • TOS
  • 𝕏
Click For A Secret Deal

Techcratic – Your All In One Tech Hub © 2020 – 2025
All Rights Reserved
∞

No Result
View All Result
  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • Crypto News
  • Cybersecurity
  • Endgadget
  • Gaming
  • I Like Cats ™
  • I Like Dogs ™
  • MacRumors
  • Macworld
  • Tech Deals
  • Techcratic ™
  • Techs Got To Eat ™
  • Tesla
  • UFO
  • Wired