Christoferson, DebraISSA Journal
To winbuy-in from top executives, avoid technical jargon when making the business case for cybersecurity awareness training. Explain the potential impact if, for example, an end user with elevated access privileges falls for a ransomware lure. Then, communicate how a strategic, thoughtfully executed...
Now that you've established a baseline and determined where you want to be going forward, you need to figure out thecybersecurity toolsand cybersecurity capabilities that will help you reach your destination. In this step, you determine how to improve your cybersecurity program so that ...
A successful cybersecurity strategy is one where you never find yourself in front of the CEO or the board having to explain how a cyber breach happened and what you are doing to mitigate it. Unfortunately, great security systems are 'invisible', because they never give you problems. This mak...
Cybersecurity is such a broad subject that many times, an organization can become stifled when trying to develop a full cybersecurity program. Some organizations that have already put a cybersecurity program in place can also unpleasantly discover gaps in their efforts, making the entire ...
down our systems," says Lujo Bauer, a professor at the Pittsburgh-basedCarnegie Mellon University, which is home to the No. 1-rankedundergraduate cybersecurity programin the U.S. News rankings. "Even under those circumstances, we want our systems to work, and that's the cybersecurity part....
Chris has experience conducting forensic work on cyberattacks. He works with MSPs day in and day out and sees first-hand the mistakes commonly made all the time. Here are the tips he shared with us on how to wise up about cybersecurity: Know your power Your tools, specifically your remote...
Consider Threat Intelligence Management to Help Combat Challenges In a rapidly evolving cyber world, threat intelligence isn’t a perfect, one-size-fits-all security solution. Threat intelligence has its fair share of challenges. Threat intelligence management, however, can help combat these challenges...
but I also recommend referring to the SANS Institute’sIncident Handler’s Handbookas you develop your plans. The Incident Handler’s Handbook is an older document, but it contains a wealth of information that will surely prove invaluable as you formulate your organization’s cyber security inciden...
In his role as the content architect of the DVMS Institute, he actively works with subject matter experts to develop relevant content for organizational leaders and practitioners. David is an NCP (NIST Cybersecurity Professional) Practitioner and a NCP Specialist. David's proudest professional ...