Like many things in life, for years we have received the Information Security solutions we deserve, not necessarily the solutions we need. The tendency to gravitate towards shiny objects and buy the “it” technology because of flashy marketing rather than a well thought out assessment of risk and application of risk treatment strategies has led to a proliferation of technologies in most environments. Worse, the technologies do not integrate, do not scale, and often require significant infrastructure to deploy.

The pandemic has sharpened our focus and opened our eyes in many ways. As we plan the future of our workplaces…


VUCA is a concept that originated with students at the U.S. Army War College to describe the volatility, uncertainty, complexity, and ambiguity of the world after the Cold War. The concept is gaining new relevance to characterize the current business environment, and the agility necessary to navigate it successfully.

The world of business is moving faster than ever, and organizations are turning towards Agile concepts to navigate the rapidly changing landscape. As a result, Digital Transformation and other change initiatives are happening at an unprecedented pace. …


The digital world has become a scary place, one which many people fear, and one in which few organizations feel they are adequately protected. Every day, there is more news about breaches, new threats, zero day attacks, and adversarial groups, as well as a barrage of new technologies that claim to solve all of these problems. Some of the technologies are very good, logical extensions to the security platforms we already have in place. A good example is the Cloud Access Security Broker (CASB) market which helps to extend well-built data and threat protections to cloud applications and infrastructures. The…


Three Short Stories

In order to properly frame the Insider Threat conversation, rather than use obscure statistics in an effort to convince you that you should be suspicious of all your employees and coworkers, I think it much more effective to tell you a few stories. None of these stories come from my clients and none of this information is privileged. You can Google any of these stories and see the details of what happened for yourself. …

Jeremy Wittkop

Trusted information protection thought leader — published author, blogger, public speaker, and advisor to customers and public and private equity investors.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store