Skip to content
STASIAK
.
What I Do
About
Content
Tools
What I Do
About
Content
Tools
NegotiatorIQ
Let's Talk.
Home
»
Blogs
Blogs & Videos
Board Focused
Business Growth Strategies
Cyber Risk Newsletter
Cybersecurity
Leadership Insights
Negotiations
Personal
Videos
Search
Dormant Vendors, Active Risk: When “We Stopped Using Them” Isn’t Enough
Pornhub and OpenAI were breached through the same analytics vendor — but the real risk.....
👉🏻 2 months ago
If You Don’t Know Your MTCR, You Aren’t Asking the Right Questions
RTO tells you how fast you can restore systems. It says nothing about whether those.....
👉🏻 3 months ago
Your CISO Might Be Unprotected — And That’s a Board Problem
The SEC's case against SolarWinds' CISO was dismissed — but the era of individual accountability.....
👉🏻 3 months ago
Micro Negotiations: How Small Concessions Quietly Destroy Margin
Most margin loss doesn’t come from one bad negotiation. It comes from dozens of small.....
👉🏻 3 months ago
We Worry About Security So You Don’t Have To.
A vendor publicly displayed both SOC 2 and ISO 27001 certifications — yet a five-year-old.....
👉🏻 3 months ago
How Confusing Product Names Dilute Value
Brands lose value when naming becomes a puzzle. BMW’s once-clear M hierarchy is now diluted.....
👉🏻 3 months ago
Passwordless Authentication: What Boards Need to Know
Passwordless authentication is moving from emerging concept to industry standard. With 92% of CISOs planning.....
👉🏻 3 months ago
Are Cybersecurity Companies Becoming Our Weakest Link?
And here’s the kicker: while Cloudflare’s own site stayed up during the outage (hmmm…), they.....
👉🏻 4 months ago
Previous
Page
1
Page
2
Page
3
Page
4
Page
5
Next
Ken Stasiak
Negotiations, Cyber Risk & Growth
Call
Email
Linkedin
Facebook
Txt Me
Blogs
Download Resume
[mailpoet_form id="5"]
[mailpoet_form id="1"]