Home

Information security is a team effort.
Count us in.

Your safe haven environment to gather, share, support and mentor

Grow your skills and career as a member of the Blue Lava Community - Built with, by and for security leaders.

Sign Up

Our Community Members

Member Exclusive Resources

Built with, by, and for the Community

Community Project - 30/60/90 Plan For Success

Take full advantage of the detailed information in this guide built with, by and for members of the Blue Lava Community. You will appreciate the guidance, language and experiences shared from our project champions.

View

Community Project - CISO Board Presentation Template

This customizable slide deck was built with, by and for members of the Blue Lava Community who are looking to enhance their board presentations. Guided by a team of 6 experienced CISOs as well as dozens of other community champions.

Watch

On-Demand Recording: Navigating Application Security Excellence in a Rapidly Evolving Security Landscape

In the ever-evolving world of cybersecurity, Application Security (AppSec) has emerged as a pivotal industry, growing exponentially and becoming a crucial aspect of modern business operations. We invite you to our exclusive one-hour Blue Lava Community meetup, “Navigating Application Security Excellence in a Rapidly Evolving Security Landscape,” where we will explore the complexities of managing AppSec...

Watch

View all

Membership Benefits

Private collaboration portal allowing members to gather, share, support, and mentor 365-days a year

01

Career services including executive placement support

02

Expert guidance on security program management

03

Relevant content and resources created with, by, and for members

04

Private meetups and best practice working groups led by member facilitators

05

Strategic mentor matchmaking

06

Criteria to Join

The Blue Lava Community is built with, by and for CISOs and also welcomes those who aspire to lead security teams in the future.

There is no sales, marketing or business development representation in the community.

CISOs (or equivalent responsibility)

01

Cybersecurity stakeholders including CIO, CRO, CTO, CPO

02

High potential cybersecurity leaders and aspiring CISOs

03

vCISOs, Consulting CISO, Business owners, Security Experts and Industry Influencers

04

Blue Lava customers

05

***No sales, marketing, or business development executives are eligible***

06

Latest Discussions

  • 1 person recommends this.
  • 2 people recommend this.
  • 1 person recommends this.

Leaderboard

Events


Blogs

News

  • For nearly a dozen years, residents of South Carolina have been kept in the dark by state and federal investigators over who was responsible for hacking into the state's revenue department in 2012 and...
  • The U.S. government is warning that smart locks securing entry to an estimated 50,000 dwellings nationwide contain hard-coded credentials that can be used to remotely open any of the locks. The lock's...
  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today it is investigating a breach at business intelligence company Sisense, whose products are designed to allow companies to view...
  • On April 9, Twitter/X began automatically modifying links that mention "twitter.com" to redirect to "x.com" instead. But over the past 48 hours, dozens of new domain names have been registered that demonstrate...
  • If only Patch Tuesdays came around infrequently -- like total solar eclipse rare -- instead of just creeping up on us each month like The Man in the Moon. Although to be fair, it would be tough for Microsoft...
  • A cybercrook who has been setting up websites that mimic the self-destructing message service Privnote.com accidentally exposed the breadth of their operations recently when they threatened to sue a software...
  • Roughly nine years ago, KrebsOnSecurity profiled a Pakistan-based cybercrime group called "The Manipulaters," a sprawling web hosting network of phishing and spam delivery platforms. In January 2024,...
  • Thread hijacking attacks. They happen when someone you know has their email account compromised, and you are suddenly dropped into an existing conversation between the sender and someone else. These missives...
  • Several Apple customers recently reported being targeted in elaborate phishing attacks that involve what appears to be a bug in Apple's password reset feature. In this scenario, a target's Apple devices...
  • The nonprofit organization that supports the Firefox web browser said today it is winding down its new partnership with Onerep, an identity protection service recently bundled with Firefox that offers...