Podcast Episode 17: Current and Future Concerns of Securing IoT Devices

The post Podcast Episode 17: Current and Future Concerns of Securing IoT Devices appeared first on CCSI.
The post Podcast Episode 17: Current and Future Concerns of Securing IoT Devices appeared first on Security Boulevard.
Continue reading Podcast Episode 17: Current and Future Concerns of Securing IoT Devices

Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring

The post Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring appeared first on CCSI.
The post Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring appeared first on … Continue reading Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring

Policy and Procedures – Security Compliance

All organizations have policies and procedures on how particular tasks and goals are established within the organization. The issue here is many of these are either word of mouth or haven’t been written down. This leads to having subjective polic… Continue reading Policy and Procedures – Security Compliance

Developing Cybersecurity Muscle Memory with Table Top Sessions

The post Developing Cybersecurity Muscle Memory with Table Top Sessions appeared first on CCSI.
The post Developing Cybersecurity Muscle Memory with Table Top Sessions appeared first on Security Boulevard.
Continue reading Developing Cybersecurity Muscle Memory with Table Top Sessions

Just Patch Already… It’s Not that Easy

We’ve all heard it before, “Just patch all the things and you’ll be perfectly fine” and there’s a lot of truth to this statement; it’s also extremely shortsighted. If you’re working in a large enterprise or an … Continue reading Just Patch Already… It’s Not that Easy

Second Annual Long Island CISO Roundtable

We recently held our second annual CISO roundtable that brought in the attendance of fifteen CISO’s for a candid conversation regarding their concerns, challenges and advice on protecting their organization. Last year’s roundtable showed th… Continue reading Second Annual Long Island CISO Roundtable

Using Deception and Automation to Reduce Attacker Dwell Time

In the treatise, “The Prince,” Niccolo Machiavelli, a 16th-century political theorist, muses about using deception to gain advantage over political…
The post Using Deception and Automation to Reduce Attacker Dwell Time appeared first on S… Continue reading Using Deception and Automation to Reduce Attacker Dwell Time

Training Wheels are Off – NYS DFS Transitional Period Finished

The two-year transitional period implemented by the New York State Department of Financial Services (NYS DFS) regarding their Cybersecurity framework, 23 NYCRR 500, finished this past March 1, 2019. This doesn’t mean the work ends here, but essen… Continue reading Training Wheels are Off – NYS DFS Transitional Period Finished