Mark Simos's Avatar

Mark Simos

@markasimos.bsky.social

Simplify and clarify • Cybersecurity architecture and strategy • Business + Security Alignment • Make the world better

548 Followers  |  11 Following  |  547 Posts  |  Joined: 08.11.2024
Posts Following

Posts by Mark Simos (@markasimos.bsky.social)

Preview
Security Roles and Glossary Part 1 - Introduction and Definitions: This document provides an overview of the structure of the Security Roles and Glossary Standard, and the common terms and definitions used. Part 2 - Roles Imple...

This will show you how to use the Security Roles and Glossary standards from The Open Group to overcome these challenges and get some wins on the board!
publications.opengroup.org/s252

26.02.2026 16:18 — 👍 0    🔁 0    💬 0    📌 0

This leads to ineffective defenses and internal conflict that threat actors regularly exploit. This session will talk about how we got here and how to get the whole team playing together.

26.02.2026 16:18 — 👍 0    🔁 0    💬 1    📌 0

Unfortunately, most of those players don't know their positions, roles, or goals - very few people know what they are supposed to do for security, why it's important, or how to do it.

26.02.2026 16:18 — 👍 0    🔁 0    💬 1    📌 0

Security will never be fully effective until everyone does their security job including boards of directors and CEOs, CISOs and CIOs, SOC analysts, everyday users, architects, IT engineers and operations, and more.

26.02.2026 16:18 — 👍 0    🔁 0    💬 1    📌 0

Security is like a sports team where very few players actually know they are on the team, only a few of them actually show up for games, and half of those are fighting with each other or playing like they are on the opposing team.

26.02.2026 16:18 — 👍 0    🔁 0    💬 1    📌 0
Post image

I am excited to talk about one of my favorite topics at BSides Tampa on May 16!

*Security is a team sport (and we are NOT playing like a team)*

26.02.2026 16:18 — 👍 1    🔁 0    💬 1    📌 0

No single solution will ever keep business assets safe from every creative attacker and their learnings/evolution.

end 🧵

09.02.2026 12:53 — 👍 0    🔁 0    💬 0    📌 0

Building security resilience is a journey of many steps and learnings, not a single plane flight to a predetermined destination. While we all wish there was a simple shortcut for security, the businesses and technical estates we defend are complex.

09.02.2026 12:53 — 👍 0    🔁 0    💬 1    📌 0

Regulatory standards can’t keep up with attackers, network security perimeters aren’t enough, and no single tool or technology can stop determined human adversaries.

09.02.2026 12:53 — 👍 0    🔁 0    💬 1    📌 0

Classic security approaches often focus on a perfect end state of compliance, a perfect network configuration, or a “perfect new tool” that fixes everything as their ideal end state.

09.02.2026 12:53 — 👍 0    🔁 0    💬 1    📌 0

There is no such thing as a single “silver bullet” solution that solves everything in security (despite what any security vendors may claim 🙂)

09.02.2026 12:53 — 👍 0    🔁 0    💬 1    📌 0
Post image

Pursuing perfect solutions is a perfect waste

From Chapter 6 - How to Scope, Size, and Start Zero Trust (Page 78) of www.amazon.com/Zero-Trust-O...

🧵

09.02.2026 12:53 — 👍 0    🔁 0    💬 1    📌 0
Post image

We documented security fiduciary duty and accountabilities in the Security Roles and Glossary Standard Part 2 and Part 3.1 - publications.opengroup.org/s252 (draft standard, feedback welcome). Some more description of this standard is at www.linkedin.com/pulse/securi...

end 🧵

08.02.2026 15:48 — 👍 1    🔁 0    💬 0    📌 0

Threat actors damage interests of shareholders and business assets, so leaders have an obligation for security management. Blaming/firing/punishing security experts for events out of their control (criminals exploit risky decisions made by business teams) is NOT effective.

08.02.2026 15:48 — 👍 1    🔁 0    💬 1    📌 0
Post image

3b. Fiduciary duty - Relate how security is part of the legal obligation that organizational leaders have to act in the best interest of the shareholders (owners) of the organization.

08.02.2026 15:48 — 👍 1    🔁 0    💬 1    📌 0
Preview
Open FAIR™ Body of Knowledge, Version 2.0 This document set is the Open FAIR Body of Knowledge, Version 2.0 composed of the Risk Analysis (O-RA) Standard, version 2.0.1 and the Risk Taxonomy (O-RT) Standard, version 3.0.1. Purchase the Per...

3a. Financial terms - Quantify cyber risk using Open FAIR™ or other methods to clearly frames security and its impact in familiar financial terms (but be careful not to devalue human life, safety, health, etc. impacts that go well beyond financial risk).
publications.opengroup.org/t230

08.02.2026 15:48 — 👍 1    🔁 0    💬 1    📌 0

2. Intentionally avoiding technical and 'one-time' language (problems and solutions, etc.) in the words and phrases you use to talk about security.

3. Relate security to something they already know:

08.02.2026 15:48 — 👍 1    🔁 0    💬 1    📌 0

There are several techniques to correct this misperception:

1. Educating leaders with clear storytelling that describes cybersecurity as crime and espionage on computers (which it is) that clearly requires keeping up with human adversaries

08.02.2026 15:48 — 👍 1    🔁 0    💬 1    📌 0
Post image

If security leaders describe security (metrics, choice of words, etc.) in technical terms, business leaders will naturally expect it's a technical 'problem (to be solved one time with installation of prevention measures) and not an ongoing business risk/force to be managed.

08.02.2026 15:48 — 👍 1    🔁 0    💬 1    📌 0
Post image

Security is often incorrectly perceived as a 'technical problem' that can be 'solved' (it isn't!) by business leaders.

*Security is an ongoing risk that requires ongoing work.*

This misperception is often accidentally created or reinforced by the security team.
🧵

08.02.2026 15:48 — 👍 1    🔁 0    💬 1    📌 0

◾ How AI affects every part of security
◾ Top priorities for each security discipline (strategy/integration/governance, architecture, SecOps/SOC, Identity, Data, app/software development, posture management, and more)

01.02.2026 20:42 — 👍 0    🔁 0    💬 0    📌 0

This was a short 20 minute talk focused on a few key points and highlights:
◾ Securing AI requires understanding it and how it works (differences from classic software)
◾ What Zero Trust actually is (cybersecurity with changed assumptions/principles)

01.02.2026 20:42 — 👍 0    🔁 0    💬 1    📌 0
Post image

I just posted my slides from my talk on Zero Trust and AI Security at The Official Cybersecurity Summit in Tampa.

Slides here - www.slideshare.net/slideshow/ai...

Some photos from the event here - www.linkedin.com/posts/jan-br...

Share and Enjoy!

01.02.2026 20:42 — 👍 1    🔁 0    💬 1    📌 0

🔹 Movie magic dynamic - They can mimic many aspects of human experience, but it's like a movie or TV show - it looks real and is often useful, but it isn't actually 'real'

I have been tinkering with this visual to capture this - I would love your thoughts and feedback.

end 🧵

27.01.2026 14:23 — 👍 0    🔁 0    💬 0    📌 0

🔹 Overconfidence - They are trained on our confident final results, not our internal thought processes that led to the conclusions (whether these are correct, wrong, or a mix).

27.01.2026 14:23 — 👍 0    🔁 0    💬 1    📌 0

🔹 Machine-like Execution - LLMs and similar tools are like any other machine (execute at scale/speed/etc whether its done well or badly), but its always based on the data they are trained on - human communications and our publications (or AI mimicry of it nowadays).

27.01.2026 14:23 — 👍 0    🔁 0    💬 1    📌 0

I think of GenAI as a genuinely 'new' entity which remixes a bunch of 'old' things we already know about in a very different way and try to keep in mind how they process (diagram) and their:

27.01.2026 14:23 — 👍 0    🔁 0    💬 1    📌 0

As we integrate these models, we need to recognize _what they actually are_ and what things they do well and don't do well.

27.01.2026 14:23 — 👍 0    🔁 0    💬 1    📌 0

▪️ We cannot expect GenAI to act like we have seen in Sci-Fi (CDR Data from Star Trek, 'I, Robot', and others) because most are a purely logical machine (that can talk) who are struggling to learn human social and emotional processing (morals, personal identity, jokes, etc.)

27.01.2026 14:23 — 👍 0    🔁 0    💬 1    📌 0

▪️ We cannot expect GenAI to have an emotional core/identity/soul with overriding moral imperatives because they are trained on our _expression_ of emotion/identity/etc. and don't actually _feel emotions

27.01.2026 14:23 — 👍 0    🔁 0    💬 1    📌 0