Kevin
-
Recent Posts
Archives
-
Tag Archives: Information Technology
Small and Medium Size Organizations at Risk
The bad guys are now starting to target mid-tier companies with their hacking activities. In many cases these companies have not yet come to realize that having a Certified Chief Information Security Officer (C|CISO) or a Virtual Cerified|CISO (vC|CISO) is … Continue reading
Posted in Uncategorized
Tagged Application Security, compliance, cyber, cyber security, Cyber Security Incident Response, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, ISO, IT, leadership, risk, risk assessment, risk management, Security
Leave a comment
The Office of No, Really?
Successful ransomware attacks are at an all time high, we are losing the cyberwar, cyber criminals are making more money than ever before and it is only going to get worse, a cyber attack could be as damaging as … Continue reading
Posted in Critical Manufacturing Cyber Security, Uncategorized
Tagged Application Security, compliance, cyber, cyber security, Cyber Security Incident Response, cyber warfare, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, IT operations, leadership, risk, risk assessment, risk management, Security
Leave a comment
For Cyber Security the Perimeter Still Exists and Never Went Away
One item that really bugs me is to hear IT and Cyber Security professionals espouse that the perimeter is dead and that Cyber Security professionals should stop focusing on tools that protect the non-existing perimeter. I was at … Continue reading
Why Protect End User Workstations Instead of Servers First?
I have been lucky enough to spend most of my Cyber Security career doing startup operations for large companies. I thrive on the energy and passion that teams get when they are given the opportunity and support to design and … Continue reading
Critical Manufacturing Legacy Systems
One common item that information Security Professionals working in Critical Manufacturing environments have to deal with is that of legacy systems. You see, in Critical Manufacturing environments it is very common for the systems that run … Continue reading
Posted in Critical Manufacturing Cyber Security, Uncategorized
Tagged compliance, cyber, cyber security, Cyber Security Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, risk assessment, risk management, Security
Leave a comment
Critical Manufacturing Cyber Security Defense Program – A Starting Look
Cyber security professionals are often tasked with trying to defend more than they have the resources to defend. This is especially true in the area of Critical Manufacturing as there tends to be a strong desire to protect everything. In … Continue reading
The Insider Threat is Alive and Well – a summary taken directly from Raytheon’s How to Build an Insider Threat Program (2014) …
Aspects of human nature further complicate matters: Well-intended managers resist any notions of “their people” doing “bad things.” They screened them. They hired them. They work with them side-by-side and – if they’re good bosses – have developed a genuine interest … Continue reading
Posted in Uncategorized
Tagged compliance, cyber security, Cyber Security Incident Response, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, Policy, risk, risk assessment, risk management, Security
Leave a comment
Just a Random Thought After an Information Technology (IT) Meeting
It is not the job of IT operational support staff to eliminate 100% of failures across the corporate infrastructure. (cost would be too high) It is ITs job to manage failures so that they stay within the levels of operation … Continue reading