Disrupting Advanced Persistent Threats

The Cybercrime Revolution

Introducing CISO Blogs

This Is How All CISOs Should Build a Business Case

 

CISO Perspectives

Are You Doing Enough To Prevent Ransomware Attacks?

Are You Doing Enough To Prevent Ransomware Attacks?

There is no silver bullet when it comes to preventing ransomware attacks. The best way to thwart an attack is to get back to basics. Require multi-factor authentication. Limit access to the network. Implement a zero-trust policy. Run user training programs. These are not the only steps CISOs should take, but they are necessary for building a secure foundation. Threat actors have banded together for decades to engineer attacks, but now it’s the “good guys’” turn to come together, share knowledge, and create processes to mitigate the risk of a ransomware attack.

Ransomware: To Pay or Not To Pay?

Ransomware: To Pay or Not To Pay?

Picture this: you’re a CISO at a hospital rushing from meeting to meeting, fielding calls in between, when suddenly you get the call. Bad actors infiltrated your system and are holding your digital assets for ransom. They’re demanding $500,000 or they’ll release your data. Data recovery isn’t your only concern. Many of these systems are literally keeping patients alive. What do you do?

How Good Is Your Cyber Intelligence?

How Good Is Your Cyber Intelligence?

When CISOs can see their organization’s data and track its lateral movement, they significantly mitigate the risk of a cyber attack or data breach. To achieve this level of cyber intelligence, your tools must be able to talk to each other. This includes the people in your organization who have access to your data; they must be able to talk to each other. With cyber intelligence, you can visualize the vulnerabilities in your organization. Without it, CISOs have only a matter of time before a threat actor takes advantage of the holes in their network.

A Conversation with Gary Gooden

A Conversation with Gary Gooden

Gary Gooden, Chief Technology and Security Officer at Seattle Children’s, has over 20 years of experience in technology infrastructure and application development. Gary was previously the CISO at Children’s Hospital Los Angeles and the Senior IT Manager at Amgen. He spent over thirteen years at Walt Disney Studios as the Divisional CIO and as Vice President Studio, IT. In 2020, Gary earned a Zero Trust Strategist certification from Forrester.

In this interview, Gary explains why combatting the next generation of cyber terrorism is like trying to push a boulder up a hill, how 5G can prevent attacks from bad actors, and shares the technology innovations being implemented at Seattle Children’s. Gary also shares his thoughts on zero trust, cyber insurance, ransomware, and the one thing that can signal “game over” for a CISO.

Does Your IR Plan Include These Components?

Does Your IR Plan Include These Components?

The whole organization, not just the security team, needs to know how to respond when a cybersecurity incident occurs. Putting together an incident response plan that’s comprehensive and effective therefore can be a daunting task. Is it easy for management to execute? Is it easy for staff to follow? Do you conduct periodic table-top exercises? When was the last time you ran one? If you’re not sure where to start, or want to refresh your current IR plan, watch this video.

Information Sharing: What to Share, With Whom, & How

Information Sharing: What to Share, With Whom, & How

There’s more to information sharing than calling the Feds. You also need to inform your partners in the event of a cybersecurity incident, not just third parties but fourth and fifth parties, too. You need to consider what information to share and how to share it. If your Microsoft Exchange server was exploited, for example, information sharing via email is far from advisable. Information sharing can be especially difficult for smaller organizations who may not have processes behind information sharing. All organizations must establish processes that include information sharing and also demonstrate the value of it to their employees.

Women in Cyber

A Conversation with Anne Marie Zettlemoyer

A Conversation with Anne Marie Zettlemoyer

Anne Marie Zettlemoyer is the Vice President of Security Engineering and Divisional Security Officer at Mastercard. She is a cyber strategist with over 20 years of experience and has served as a trusted advisor for Fortune 500 companies, government agencies, law enforcement and security vendors. Anne Marie holds an MBA from the University of Michigan and BAs in Accounting and Finance.

In this spirited interview, Anne Marie equates her cyber career path to a pretzel and tells an inspiring story about the importance of showing up. She also highlights two things vendors need to improve on, discusses the initiatives at Mastercard to stop cyber criminals, and shares the one quality you need if you want to make it in cybersecurity.

A Conversation with Katie Arrington

A Conversation with Katie Arrington

In this interview, Ms. Arrington shares her view from the Pentagon of the pandemic and how the experience mirrors the terrorist attacks on 9/11. She also shares an interesting story about how she got her start in cybersecurity, how FaceTime, telehealth and food delivery apps have become essential services during COVID, and the surprising individuals who inspire her the most.

CISO BLOGS

Stagehand: Episode 4

Stagehand: Episode 4

Keith and I left the scene like we found it: the two kidnappers dead on the floor, their shotgun up against the wall, and the rope used to tie up Carl Timmons sprawled out on the floor. We tipped off local law enforcement and were gone before they arrived, leaving no...

read more
Relationships in the Cyber Era

Relationships in the Cyber Era

The APT era is here. Attacks are becoming more common and the level of damage increasing in severity. As CISOs, we must prepare for the APT era. We must commit to changing our attitude and not adopting only advanced technological tools. The current awareness is not...

read more
SecOps Needs More Democratization, Not Less SOC

SecOps Needs More Democratization, Not Less SOC

An increasing complexity of technologies, as well as an increasing number of failures and attacks followed by an increasing dependency on business goals is changing the way we run Security Operations Centers. I previously discussed the concept of a Fusion Center as an...

read more
Measuring a Cyber Awareness Culture

Measuring a Cyber Awareness Culture

Until recently, cyber awareness metrics have been treated by many as a tick-box exercise driven by regulations. The regulator requires x number of hours of cyber awareness training per employee per year, and once that is done, the organisation ticks a box and waits...

read more
Good Enough Isn’t Good Enough Anymore

Good Enough Isn’t Good Enough Anymore

The cyber risks we face today are more than we faced previously but also fundamentally different in several respects. Our adversaries are more adept and their tools and tactics more protean in capability.  In light of these increasing challenges, our cyber defenses...

read more

CISO Sillies

Can You Hear Me Now?

Can You Hear Me Now?

Since the global pandemic chased everyone indoors, Zoom web meetings have become the new normal. We will figure this out. Eventually.

Beware The CISO’s Wrath

Beware The CISO’s Wrath

CISOs have a lot of patience. Patience however is a virtue that can be tested from time to time. As the old saying goes, if you’re not a part of the solution…