Tag Archives: risk management

Small and Medium Size Organizations at Risk

The bad guys are now starting to target mid-tier companies with their hacking activities.  In many cases these companies have not yet come to realize that having a Certified Chief Information Security Officer (C|CISO) or a Virtual Cerified|CISO (vC|CISO) is … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

Security Steering Committee – Members Needed

Image | Posted on by | Tagged , , , , , , , , , , , , , , , | Leave a comment

The Office of No, Really?

  Successful ransomware attacks are at an all time high, we are losing the cyberwar, cyber criminals are making more money than ever before and it is only going to get worse, a cyber attack could be as damaging as … Continue reading

Posted in Critical Manufacturing Cyber Security, Uncategorized | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

Why Protect End User Workstations Instead of Servers First?

I have been lucky enough to spend most of my Cyber Security career doing startup operations for large companies.  I thrive on the energy and passion that teams get when they are given the opportunity and support to design and … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

Critical Manufacturing Legacy Systems

         One common item that information Security Professionals working in Critical Manufacturing environments have to deal with is that of legacy systems. You see, in Critical Manufacturing environments it is very common for the systems that run … Continue reading

Posted in Critical Manufacturing Cyber Security, Uncategorized | Tagged , , , , , , , , , , , | Leave a comment

Critical Manufacturing Cyber Security Defense Program – A Starting Look

Cyber security professionals  are often tasked with trying to defend more than they have the resources to defend. This is especially true in the area of Critical Manufacturing as there tends to be a strong desire to protect everything.  In … Continue reading

Posted in Critical Manufacturing Cyber Security, Uncategorized | Tagged , , , , , , , , , , | Leave a comment

Cyber Security – A basic look at Defense in Depth

A basic somewhat quirky and fun look at Defense in Depth.  

Video | Posted on by | Tagged , , , , , , , , , | Leave a comment

The Highest Risk Ever….. Not!

  I just received one of my daily news reports about Cyber Security and it said something to the effect of such and such a Research group has found out that Application Security holes are at highest numbers ever and … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Home Depot Breach 43M loss posting on LinkedIn

I just read an article on LinkedIn about the negative impact caused by the recent Home Depot breach. Here are my thoughts about how all the 2014 breaches should change some C level and Information Security paradigms. These could cause a major … Continue reading

Aside | Posted on by | Tagged , , , , , , , , | Leave a comment

The Insider Threat is Alive and Well – a summary taken directly from Raytheon’s How to Build an Insider Threat Program (2014) …

Aspects of human nature further complicate matters: Well-intended managers resist any notions of “their people” doing “bad things.” They screened them. They hired them. They work with them side-by-side and – if they’re good bosses – have developed a genuine interest … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment