Tag Archives: Incident response

Why You Need to Take an Active Role in Your AWS Cloud Environment – One of the Largest Data Breaches

CLOUD ENVIRONMENT: The Capital One incident is one of the largest data breaches of all time, involving 100 million credit card applications and 140,000 Social Security numbers;  the bank’s stock market price took an immediate hit as company executives and IT personnel began scrambling to implement the firm’s incident response plan.

How Prepared Are You for a Cyber Security Incident?

In the past decade we have seen companies defined by how their leadership responded to a cyber security incident.  The most prominent incident is a data breach, which is becoming a too common occurrence, involving billions of people.

Cybersecurity Regulations: What the NYCRR 500 Deadline of March 1, 2019 Means to You

NYCRR 500 New York City is often referred to as the financial capital of the world; with the state of cybersecurity today and the increasing barrage of threats that financial related institutions must combat on a daily basis, it is no wonder that New York became the first state to take government action to do something […]

4 Important Steps to Take When Creating an Incident Response Plan

By Erik Leach, CISSP, SCFImagine coming home and finding your house broken into and some of your belongings missing.  As you totter from room to room, you would probably feel anger, frustrated, disturbed and a little overwhelmed.  At a vulnerable moment such as that, it probably would not be the best time to engage in […]

RANSOMWARE: CURRENT STRAINS, ATTACK VECTORS AND PROTECTION

By Steve Lawn, Senior Consultant Staying ahead of security threats is no easy task. One threat that should definitely be on your radar is ransomware. From hospital heists to attacks on schools and other businesses, ransomware is costly and is projected to be one of the biggest threats in 2016. According to CNN, the FBI […]

INCIDENT RESPONSE: KNOWING YOUR OBLIGATIONS IN THE EVENT OF A SECURITY BREACH

Author: Glenn A. Stout, Ph.D, PMP Your organization just experienced a data security breach. All of the data that was entrusted to your organization to be kept safe is now “out there” on the Internet.  Your organization doesn’t have an incident response plan (IRP).  Who do you call?  When should you call?  What information needs to […]

ENDPOINT DETECTION AND RESPONSE: FIRE FOR EFFECT

The modern digital landscape is a battleground rife with adversaries ready and willing to go to great lengths to steal your data. Clever independent attackers and state-sponsored actors alike are deploying increasingly effective versions of cyber attacks intended to intrude, infect, steal, evade, disrupt and destroy everything they touch. To defend themselves, many businesses are […]

PREPARING FOR YOUR DATA BREACH

PREPARING FOR YOUR DATA BREACH. Author: Chris Cronin, ISO 27001 Auditor Most InfoSec professionals don’t want to think about becoming the next victim of a major data breach to make the headlines. And yet when faced with another major data breach it is a time when Executive Management and security teams reflect on their own insecurities. […]

How to Secure Your Assets from Cyber Sewage

There I was, ankle deep in raw sewage, incredulous that for the second time this summer, my basement was filling up with foul smelling murky waste. As I looked hopelessly at my wife while the water level continued to rise, I angrily thought to myself, “What else can I do?” Didn’t I shell out some […]