Tag Archives: Incident Response

Small and Medium Size Organizations at Risk

The bad guys are now starting to target mid-tier companies with their hacking activities.  In many cases these companies have not yet come to realize that having a Certified Chief Information Security Officer (C|CISO) or a Virtual Cerified|CISO (vC|CISO) is … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

The Office of No, Really?

  Successful ransomware attacks are at an all time high, we are losing the cyberwar, cyber criminals are making more money than ever before and it is only going to get worse, a cyber attack could be as damaging as … Continue reading

Posted in Critical Manufacturing Cyber Security, Uncategorized | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

Information Security Defense in Depth Part 2 – A Bit More Technical View

Still for foundation level folks but a bit more technical view of Defense in Depth than last week’s post.    

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

Cyber Security – A basic look at Defense in Depth

A basic somewhat quirky and fun look at Defense in Depth.  

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

Your Horse Was Analog

Your Horse Was Analog Kevin L. McLaughlin A  speech I made to 350+ people at the Michigan joint Military Ball.  Amway Grand Plaza Hotel. Like my tie? My wife didn’t – gave me a lot of grief before we left … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

The Insider Threat is Alive and Well – a summary taken directly from Raytheon’s How to Build an Insider Threat Program (2014) …

Aspects of human nature further complicate matters: Well-intended managers resist any notions of “their people” doing “bad things.” They screened them. They hired them. They work with them side-by-side and – if they’re good bosses – have developed a genuine interest … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

A day in the life of a senior Cyber Security Incident Responder

  The day was proving to be an exciting one for team Havoc, the Company’s cyber Red Team, as the L2 report he had just read showed that 4 of the core company servers were vulnerable to a very common … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment