CISO Platform's Blog (65)

Is the Coronavirus Creating Data Breaches?

[Posted on Behalf of Dan Lohrmann Chief Strategist & Chief Security Officer Security mentor, Inc. ]

From telework mistakes, to virus-related phishing links, to new work processes to nation-state hackers, here’s how the coronavirus creates new opportunities for cybercriminals.

 Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC…


Added by CISO Platform on July 31, 2020 at 4:18pm — No Comments

A Quantified Approach to Cybersecurity Risk Management

[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services  Information Security Media Group (ISMG) ]
Cybersecurity Risk Assessment should be a hot topic these days. How else can you not only convince your board and management team that you need to do something to protect against cyber-attacks, but also be able to communicate for once in a language they understand?

What if Equifax knew that their risk was quantified at more than $1.4B (as…

Added by CISO Platform on July 31, 2020 at 4:15pm — No Comments

Innovation & Growth

[Posted on Behalf of Subbu Iyer Founder and chief Designer Hreemm ]

The Process of Innovation

Globally the understanding of the Process of Innovation has been driven as a populist understanding of Ideas Management. That probably worked when the rate of innovation and the expectations of growth were spaced incrementally. That equation cannot work when the socio-economic demand is exponential both in terms of time and…


Added by CISO Platform on July 29, 2020 at 11:59am — No Comments

When Will You Go Back To The Office – If Ever?

[Posted on Behalf of Dan Lohrmann, Chief Strategist & Chief Security Officer Security mentor, Inc.]
As the governments lift stay-at-home emergency orders, organizations are grappling with what it means to reopen offices. What will change? Will telework be the new normal? Let's explore.

By any measure, the number of professionals working from home (WFH) has skyrocketed during the pandemic. Public and private sector organizations quickly adopted telework…

Added by CISO Platform on July 29, 2020 at 11:55am — No Comments

Amidst working from home, secure the “Home WiFi” network

[Posted on Behalf of Archie Jackson,  Senior Director and Head of IT & IS Incedo Inc]

There is a #global new normal during the #COVID19 #pandemic of working from home. Be it any industry, the mode of operation has limited to the boundaries of residences.

Listing down 10 important measures to strengthen the controls of security & privacy for your Home-Office WiFi.

 1.      Default Router…


Added by CISO Platform on July 29, 2020 at 11:53am — No Comments

Incident Response. Missing?

[Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs]
Incident Response. Picture of a Failed One !

Recent Wipro fiasco on Breach reported by noted security researcher, Brian Krebs, is a study in either lacking incident response, or else, a mismanaged (or shall I use the word as muddled) incident response.
For the uninitiated ...

Kreb reported a potential breach of Wipro, where its systems were compromised and then…

Added by CISO Platform on July 29, 2020 at 11:49am — No Comments

Curve-jumping" in Security Operations and SOAR Technologies

[Posted on Behalf of  Anton Chuvakin Security Strategy - chronicle  Google ] 

Lets think about this together -- can you really jump to the “next curve” in security, or do you have to travel the entire journey from the old ways to the cutting edge?

This is a harder question than it appears and there are temptations on both sides of the argument. Also, there are false answers on both sides, tempting though they may be (e.g.…


Added by CISO Platform on July 27, 2020 at 5:39pm — No Comments

Strategy - How CISOs Build Their Road Map

[Posted on behalf of Gary Hayslip CISO  Softbank Investment advisor]
Recently, I addressed a group of security professionals, and our discussion was on how CISOs develop their strategy. I found many in the audience had no idea how security executives develop strategy, nor were they comfortable that strategic plans could be changed or quickly discarded.

As I sit in an airplane flying to London, I am thinking about my answers that evening. In speaking to the…

Added by CISO Platform on July 27, 2020 at 5:35pm — No Comments

Security in Super Connected World (IoT Security)

[Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs ]

Introduction to IoT Phenomenon (Internet of Things)

Computing and its pervasiveness

In the last few decades more and mode devices have been connected to the internet and to each other.…


Added by CISO Platform on July 6, 2020 at 5:26pm — No Comments

Cross-post: About Threat Intel Retro-Matching

[Posted on Behalf of  Anton Chuvakin, Security Strategy - chronicle Google] 

So you recall my recent post about TI matching to security telemetry like logs in near real-time? I did say that most threat intelligence (TI, also called“threat data” in this post) comes from past observations of badness. In fact, the whole model of value for threat intelligence is that even though such badness is past for the initial observer, it is a likely future…


Added by CISO Platform on July 6, 2020 at 4:12pm — No Comments

How may I help You (That little Chatbot in your website) !

[Posted on Behalf of Pushkal Mishra, AVP IT & CISO  HDFC ERGO Health Insurance Ltd ]

There has been a wide adoption of A.I. (Artificial Intelligence) in the last few years. You might have seen them in chat rooms or on companies’ websites providing you information about Insurance, Banking products, Customer support or smart speakers or even inside your favorite Barbie doll, now a conversational doll !

As per…


Added by CISO Platform on July 6, 2020 at 4:00pm — No Comments

Crosspost: [Not Really About] Top 10 SIEM Log Sources in Real Life

[Posted on Behalf of  Anton Chuvakin, Security Strategy - chronicle Google] 

One of the most common questions I received in my nalyst years of covering SIEM and other security monitoring technologies was “what data sources to integrate into my SIEM first?”

And of course the only honest answer to this question is: it depends on your security monitoring use cases and how you prioritize them.Naturally, some people then ask…


Added by CISO Platform on July 6, 2020 at 3:49pm — No Comments

Maintaining Data Security & Privacy with Learning Machines

[Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS   Incedo Inc]

AI is a huge ecosystem of tools, languages, frameworks with functions ranging from data ingestion, data pre-processing, modeling, model evaluation, integration, visualization, packaging & deployment, etc.

Multiple stakeholders’ groups ranging from traditional software engineers to machine learning engineers, data scientists…


Added by CISO Platform on July 6, 2020 at 3:40pm — No Comments

A Mentor's Advice

[Posted on Behalf of Gary Hayslip,  CISO Softbank Investment advisor ]

In my 20+ years as an information technology and cybersecurity professional, I have had the privilege to work with and mentor some amazing people. I have learned as a CIO and as a CISO sometimes you don’t always get to pick the teams you build and sometimes you inherit interesting employees from previous leaders. Even with these less than ideal situations, you…


Added by CISO Platform on July 6, 2020 at 3:35pm — No Comments

Is Your Organization Prepared For a Digital Future?

[Posted on Behalf of Subbu Iyer, Founder and chief Designer Hreemm]

In 2015 and 2017, PETER WEILL AND STEPHANIE L. WOERNER surveyed several hundred enterprises, examining both the capabilities needed for transformation and the impacts on performance. Based on our analysis, companies in the future-ready quadrant performed much better than their industry peers. According to the authors whose article is published in the 2018 Winter Edition of…


Added by CISO Platform on July 6, 2020 at 3:28pm — No Comments

Data Privacy and Biometrics

[Posted on Behalf of Steve King,  Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]

Biometrics, while an element of data security, is a unique attribute that should be treated in an extraordinary fashion.

Passwords and MFA data are useful to attackers, but facial, retina and fingerprint scans open a whole new world of threat.

DNA is also coming soon.

It is…


Added by CISO Platform on June 23, 2020 at 2:19pm — No Comments

Management in time of AI and ML

[Posted on Behalf of Rajeev Shukla, Founder and CEO, Castellum Labs] 

The world around you is altering in irrevocable ways. Software/s is eating the whole sectors, not just the jobs, anymore. Within next decade, "The Enterprises" and "The Jobs", will take on a very different meaning. Some key questions ... !

How and what will be job profile of the future?

What would it mean for people who are to manage…


Added by CISO Platform on June 17, 2020 at 5:18pm — No Comments

19 Things I followed in 2019 & continue to...

[Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS Incedo Inc]
C>O>P>I>S: Customer is the center of the universe. Everyone around us are customers tangibly or intangibly, including self. 

Solve Problems: Be the problem solver. If you think you can solve a problem, do not hesitate.... dive in and attempt. 

Compete with self: Local competitions are underestimation. We are a small dot in the entire…

Added by CISO Platform on June 17, 2020 at 5:14pm — No Comments

Can I Have Decent Detection and Visibility on a Badly Managed Network?

[Posted on Behalf of Anton Chuvakin, Security Strategy - chronicle Google]

Let me ask you this: do smaller businesses (say, SMBs) get more security vendor lies than large enterprises? My past analyst experience certainly seems to suggest so. When I was an analyst, the most ridiculous claims, the craziest “features” and the sleaziest marketing decks were most often seen from the vendors that target just such businesses. The word “target” here is…


Added by CISO Platform on June 17, 2020 at 5:08pm — No Comments

Who will pay for your cyber liabilities?

[Posted on Behalf of Pushkal Mishra AVP IT & CISO HDFC ERGO Health Insurance Ltd)

The 2019 edition of Symantec threat report reveals that:

- One in 10 URLs are malicious

- More than 70 million records stolen from poorly configured *S3 buckets

- 56% rise in web attacks with an average of 4,800 websites compromised each month

- Enterprise *ransomware up by…


Added by CISO Platform on June 17, 2020 at 5:04pm — No Comments

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service