Kevin
-
Recent Posts
-

-

Archives
- January 2025
- December 2024
- October 2023
- September 2023
- July 2023
- June 2023
- May 2023
- April 2023
- February 2023
- January 2023
- July 2022
- May 2022
- April 2018
- February 2018
- June 2017
- September 2016
- March 2016
- February 2016
- December 2015
- April 2015
- February 2015
- November 2014
- October 2014
- September 2014
- March 2014
- December 2013
- October 2013
- March 2013
- November 2012
- October 2012
-
Tag Archives: Cyber Security Incident Response
Critical Manufacturing Legacy Systems
One common item that information Security Professionals working in Critical Manufacturing environments have to deal with is that of legacy systems. You see, in Critical Manufacturing environments it is very common for the systems that run … Continue reading
Posted in Critical Manufacturing Cyber Security, Uncategorized
Tagged compliance, cyber, cyber security, Cyber Security Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, risk assessment, risk management, Security
Leave a comment
Information Security Defense in Depth Part 2 – A Bit More Technical View
Still for foundation level folks but a bit more technical view of Defense in Depth than last week’s post.
Critical Manufacturing Cyber Security Defense Program – A Starting Look
Cyber security professionals are often tasked with trying to defend more than they have the resources to defend. This is especially true in the area of Critical Manufacturing as there tends to be a strong desire to protect everything. In … Continue reading
Cyber Security – A basic look at Defense in Depth
A basic somewhat quirky and fun look at Defense in Depth.
A Note I Wrote to Someone Who Once Worked for Me
I recently had the honor to help provide a strong reference for a person who worked for me as a Cyber Analyst. She got the Senior position she was going for but was just a little worried about what they should do … Continue reading
I just read an article on LinkedIn about the negative impact caused by the recent Home Depot breach. Here are my thoughts about how all the 2014 breaches should change some C level and Information Security paradigms. These could cause a major … Continue reading
The Insider Threat is Alive and Well – a summary taken directly from Raytheon’s How to Build an Insider Threat Program (2014) …
Aspects of human nature further complicate matters: Well-intended managers resist any notions of “their people” doing “bad things.” They screened them. They hired them. They work with them side-by-side and – if they’re good bosses – have developed a genuine interest … Continue reading
Posted in Uncategorized
Tagged compliance, cyber security, Cyber Security Incident Response, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, Policy, risk, risk assessment, risk management, Security
Leave a comment
A day in the life of a senior Cyber Security Incident Responder
The day was proving to be an exciting one for team Havoc, the Company’s cyber Red Team, as the L2 report he had just read showed that 4 of the core company servers were vulnerable to a very common … Continue reading