Posted on Categories CISO Blog   Leave a comment on Cyber Security in you Supply chain…. Do you need it?

Cyber Security in you Supply chain…. Do you need it?

You should not need to think about the answer to this question, it should be an automatic YES. The question you will be asked is “Why is it important to my business, we don’t do logistics we do ###”. Supply chain is not just about the movement of items but anything you need to keep your business a going concern. Any “body” that supply’s your business with services or product is your supply chain and they must be able to … Continue reading “Cyber Security in you Supply chain…. Do you need it?”

Posted on Categories CISO Blog   Leave a comment on The CISO Blog….again

The CISO Blog….again

It has been reported that Internet-Enabled Crime for 2020 exceeded $4.2 Billion in the US alone…and who knows what the actual figure globally is. Key items for #leadership and #ciso to look at going forward: Supply chain security … yes that includes your security products, are they as secure as what you are? Can they prove it? People Security…. Invest in training and awareness and make it part of their KPI’s / Bonus calcs Identity analytics….if you cannot answer these … Continue reading “The CISO Blog….again”

Posted on Categories CISO Blog   Leave a comment on If you are using a LastPass as you password manager read on….. if not read on anyway.

If you are using a LastPass as you password manager read on….. if not read on anyway.

It has come to light that LastPass is sharing tracking information from to various providers, such as Google and Segment. The report states the “Even the app developers do not know what data is collected and transmitted to the third-party providers” So how comfortable do you feel about your password manager now? Free stuff is NEVER free. 1Password has none, KeePass has none… So why are there seven embedded trackers in the LastPass Android app? • The Register

Posted on Categories CISO Blog   Leave a comment on The risk of End of Life equipment

The risk of End of Life equipment

End of Life (EoL) and End of Maintenance (EoM) being disregarded in real life leads to epic compromise of their customers in what they call a “one-two-punch”, first they had their info stolen, then held to ransom. “Software company Accellion has released preliminary findings around the security incident that has stung some customers that used its 20-year-old File Transfer Appliance.” https://www.inforisktoday.com/accellion-how-attackers-stole-data-ransomed-companies-a-16038?rf=2021-02-24_ENEWS_SUB_IR__Slot1_ART16038&mkt_tok=eyJpIjoiWlRBNVpEZ3hNalJsT1RObSIsInQiOiJ4Q1p1ZlBwMkdtSHVjRkVjekY1dnhCZjVZUE5leWlpNVE3WUF2ZXZpRDRsRG5nYjBRZVlHcWtHejJqK2p1cDM3c3VjUWdpUHdrMVR5YWZVN2FVRzgxaDBXemE2aVh3ZDV5MnVUWktTZ2lcL1B5bTFsYnVoenVCKzUyUWlndWlMazBPUXZaVkZBcjNIRkZZc1V3OFpQVkJnPT0ifQ%3D%3D

Posted on Categories CISO Blog   Leave a comment on The after effects of Hurricane SolarWinds

The after effects of Hurricane SolarWinds

Whitehouse Executive Action imminent….. I grabbed one item out of the release, it is one that I have been waiting for and I am sure most other #ciso also. It is time that businesses #leadership understand that the CISO can no longer report to the CIO for the same reasons that #Risk and #internalauditing are separate units. The CISO needs that independence to execute their function https://www.databreachtoday.com/white-house-preparing-executive-action-after-solarwinds-attack-a-16024?rf=2021-02-19_ENEWS_SUB_DBT__Slot1_ART16024&mkt_tok=eyJpIjoiWVdZM09EWTNOR1F5TnpSbSIsInQiOiJDcUVRUCtLMzZJR1ZQMytINXlxK3duYWgzTEZlNkEwRnRXd1czbFpEOTdJNWxnQVR6VVU0Tnh4SkxKTjB5aE5NVTZzdG1TcVNuaG5oNFdSRHlQZUxUXC9IZkpvenE0UU1LaVRtSnVKalVtenR4eHlnOEF4ZzYrXC9heG1sZGNNRE95aXJcLzdWZjVcL3lwV3dzcnR0REVJaG1RPT0ifQ%3D%3D “Since the position of the CISO was created, most report to the chief … Continue reading “The after effects of Hurricane SolarWinds”

Posted on Categories CISO Blog   Leave a comment on The next cold war

The next cold war

6G is emerging as the next battleground for world dominance and the key countries fighting to get there are the USA and China…. conservatively it is still 10 years away, that aside, can you imagine the benefits this can bring to the world? oh…. and the nightmares for the #ciso to defend it 🙂 https://www.bendbulletin.com/business/forget-5g-the-u-s-and-china-are-already-fighting-for-6g-dominance/article_1c7fc087-e03f-534e-8b5b-d63e48fb2479.html

Posted on Categories CISO Blog   Leave a comment on Water Treatment plant hacked!

Water Treatment plant hacked!

So… hackers targeted a water treatment plan and set chemical levels to dangerous levels. The attack was detected and fixed immediately…kudos….. but only because someone was looking at the screen and saw the mouse moving….. now let that sink in, then ask the question “how secure is your national infrastructure?” Then imagine what could happen if this was not caught…. #Cybersecurity https://www.zdnet.com/article/hacker-modified-drinking-water-chemical-levels-in-a-us-city/

Posted on Categories CISO Blog   Leave a comment on RICA Unconstitutional

RICA Unconstitutional

So in short the RICA is unconstitutional and the takeout I took is that one aspect is that the subject of the surveillance must be informed, after the fact, of such surveillance 🙂

So in short the RICA is unconstitutional and the takeout I took is that one aspect is that the subject of the surveillance must be informed, after the fact, of such surveillance 🙂

Posted on Categories CISO Blog   Leave a comment on Your dreams matter

Your dreams matter

In a world filled with negativity it is very easy to lose sight of your dreams #believe #lifestyle #instagram #recovery #bhfyp #healthylifestyle #wellbeing #goals #peace #success #art #ptsd #beauty #support #motivationalquotes #yoga #like #growth #hope #mentalwellness #smile #stress #trauma #gratitude #community #photography #awareness #mentalhealthsupport #mentalhealthadvocate #nature