Skip to content

Call +1 (888) 896-7580 for Proactive Cyber Security© Services and Solutions

Category: CXO

As a Chief Security Officer, Chief Information Security Officer, Chief Information Officer, Chief Privacy Officer and career technology practitioner, this category focuses on relevant material and information.

February 5, 2009June 17, 2010 by Michael Peters

Laws of Power – 9

Win through your actions, never through argument: any momentary triumph you may think you have been through argument is really a Pyrrhic victory: the resentment and ill will you stir up is stronger and last longer than any momentary change of opinion. It is much more powerful to get others to agree with you through… Read More

CXO, Uncategorized
February 4, 2009June 17, 2010 by Michael Peters

Laws of Power – 4

Always Say Less Than Necessary: when you are trying to impress people with words, the more you say, the more common you appear, and the less in control. Even if you are saying something banal, it will seem original if you make it vague, open-ended, and sphinxlike. Powerful people impress and intimidate by saying less.… Read More

CXO, Uncategorized
February 4, 2009May 3, 2009 by Michael Peters

Laws of Power – 3

Conceal Your Intentions: keep people off balance and in the dark by never revealing the purpose behind your actions. If they have no clue what you are up to, they cannot prepare a defense. Guide them far enough down the wrong path, and envelop them in enough smoke, and by the time they realize your… Read More

CXO, Uncategorized
January 23, 2009June 17, 2010 by Michael Peters

Laws of Power – 1

Never outshine the Master: always make those above you feel comfortably superior. If you desire to please or impress them, do not go too far in displaying your talents or you might accomplish the opposite — inspire fear and insecurity. Make your masters appear more brilliant than they are and you will attain the heights… Read More

CXO, Uncategorized
January 23, 2009May 3, 2009 by Michael Peters

Laws of Power – 2

Never put too much trust in friends, learn how to use enemies: Be wary of friends — they will betray you more quickly, for they are easily aroused to envy. They also become spoiled and tyrannical. But hire a former enemy and he will be more loyal friend, because he has more to prove. In… Read More

CXO, Uncategorized

Posts navigation

Newer posts →

Looking for Something?

Recent Updates

  • Risk Management and Governance in the Face of Ransomware and APTs
  • A Roadmap for Adopting a GRC Solution
  • What Are the 5 Trust Services Criteria in SOC 2 Compliance
  • Developing Key Risk Indicators in GRC
  • SASE and Its Role in Compliance Management Strategy
  • Mapping CMMC to Zero Trust Architectures
  • Why Traditional MSP Security Models May Fall Short in Modern Enterprise
  • Automapping CMMC and FedRAMP Controls
  • Navigating Workflow Disruptions in CMMC Compliance
  • Automapping CMMC with NIST 800-53

Site Administration

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org