If you are like me it is easier to understand things if they are put into something relatable. This is my interpretation of how an information security project can be like deciding on a meal, and the different stages.

Now it isn’t the perfect analogy but it does explain some of the different steps and how an information security project can be broken down. Like hosting a party, an infosec project can be daunting but making sure you plan can make it less so.

As I alluded to, information security (and cyber security or data protection) projects should be seen as investments too, it is very rare you invest in any program and get nothing from it moving forward. New equipment, extra features, better training, and self-improvement to name a few.

I have taken a few shortcuts, but hopefully, this has been of assistance and given you ‘food for thought’.

Bon appetite!


Link to the slides –  A Meal of Information Security


Useful Resources Links Featured in the Slides

The AntiSocial Engineer – Harmful Domain Blacklist 

Hightable – How to Create a Risk Register

KnowBe4 – Phish Alert Button

Custodian360 – Send an email to subscribe@custodian360.com for threat notifications

CrowdStrike – Keys to Embracing (and securing) a Remote Workforce

WPScan – WordPress Vulnerability Scanner