Home

Information security is a team effort.
Count us in.

Your safe haven environment to gather, share, support and mentor

Grow your skills and career as a member of the Blue Lava Community - Built by, with and for security leaders.

Sign Up

Our Community Members

Membership Benefits

Private collaboration portal allowing members to gather, share, support, and mentor 365-days a year

01

Access to a support system of battle-tested business and security executives

02

Expert guidance on security program management

03

Relevant content and resources created with, by, and for members

04

Private meetups and best practice working groups led by member facilitators

05

Strategic mentor matchmaking

06

Criteria to Join

CISOs (or equivalent responsibility)

01

Cybersecurity stakeholders including CIO, CRO, CTO, CPO

02

High potential cybersecurity leaders and aspiring CISOs

03

vCISOs, Consulting CISO, Business owners, Security Experts and Industry Influencers

04

Blue Lava customers

05

***No sales or marketing executives***

06

Latest Discussions

  • 2 people recommend this.

Featured resources

Crucial Conversations w/ Rock Lambros - Securing IT and OT

Rock Lambros, CEO and founder of RockCyber, discusses how CISOs are taking the lead...

Read more

Crucial Conversations w/ Jasper Ossentjuk - What Every CISO Needs to Know About Crisis Management

Jasper Ossentjuk, SVP and CFO for Nielsen IQ, discusses what every CISO needs to know about crisis management planning and how it differs...

Read more

Crucial Conversations w/ Alex Kreilein - Product Security Best Practices

Alex Kreilein discusses what it takes for CISOs and InfoSec teams to become security advocates for customers by ensuring the safety...

Read more
View all

Events


Blogs

News

  • A class action lawsuit has been filed against big-three consumer credit bureau Experian over reports that the company did little to prevent identity thieves from hijacking consumer accounts. The legal...
  • Email scammers sent an Uber to the home of an 80-year-old woman who responded to a well-timed email scam, in a bid to make sure she went to the bank and wired money to the fraudsters.  In this case, the...
  • With the recent demise of several popular "proxy" services that let cybercriminals route their malicious traffic through hacked PCs, there is now something of a supply chain crisis gripping the underbelly...
  • 911[.]re, a proxy service that since 2015 has sold access to hundreds of thousands of Microsoft Windows computers daily, announced this week that it is shutting down in the wake of a data breach that...
  • Microleaves, a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, exposed their entire user database and the location of tens of millions...
  • It's been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. The leak led to the public shaming and extortion of many AshleyMadison...
  • U.S. state and federal investigators are being inundated with reports from people who’ve lost hundreds of thousands or millions of dollars in connection with a complex investment scam known as “pig butchering...
  • For the past seven years, an online service known as 911 has sold access to hundreds of thousands of Microsoft Windows computers daily, allowing customers to route malicious traffic through PCs in virtually...
  • The latest Jan. 6 committee hearing on Tuesday examined the role of conspiracy theory communities like 8kun[.]top and TheDonald[.]win in helping to organize and galvanize supporters who responded to former...
  • Microsoft today released updates to fix at least 86 security vulnerabilities in its Windows operating systems and other software, including a weakness in all supported versions of Windows that Microsoft...