A well-run kitchen requires a fully stocked pantry and a clear understanding of what’s on hand. In cybersecurity, your pantry is your asset inventory—every server, every piece of software, and even those firmware components lurking in the background. You wouldn’t want to cook without knowing exactly what ingredients are available, and you don’t want to secure your supply chain without knowing what’s in your digital inventory.
|
By Tigran Safari
AI isn’t some far-off sci-fi concept anymore. It’s here, and it’s coming to a bank near you! Listen to the latest from Tigran Safari and Chris Clements on this month’s Banking Podcast from The Kafafian Group.
|
By Gary Perkins
Social engineers rely on two key psychological triggers: urgency and empathy. When people feel rushed or that they are helping someone in need, their normal critical thinking is often overridden. Attackers don’t just hack systems; they hack people, and they’re exceptionally good at it.
|
By Chris Clements
Because of the frequency of phishing attacks landing in user mailboxes and the severity of the consequences of a user falling for a lure, any improvement at all can make the difference between an organization suffering a breach.
|
By Gary Perkins
While the scale of this data breach is alarming – with 277 gigabytes of data reportedly stolen – it’s important not to panic. Instead, focus on taking concrete steps to protect yourself. Stay informed, be proactive in safeguarding your personal information, and remain vigilant for any signs of suspicious activity.
…In the world of supply chain security, vigilance is your best friend. Stay informed, stay alert, and always prioritize security in your decisions. After all, in this interconnected digital world, we’re all in this together.
|
By Jerry Dawkins
September 12, 2024 Jerry Dawkins, PhD In the world of cybersecurity, the recent incident involving Snowflake has sparked a significant discussion around the shared responsibility between vendors and customers. The attacks, which targeted over 100 Snowflake customers, have highlighted vulnerabilities that arise not from the platform itself, but from how customers manage their security environments.
|
By Gary Perkins
In this landscape, organizations need a multi-faceted approach that includes prevention, detection, and response capabilities. A warranty tied to a comprehensive security solution supports this approach, providing both technological protection and financial assurance.
Earlier this month, a group of our intrepid pen testers from our Readiness & Resilience team at CISO Global ventured into the heart of the hacking world at DEFCON 32 in Las Vegas. This annual pilgrimage to the mecca of cybersecurity (and more importantly, hacking) is more than just a conference – it’s a hands-on deep dive into the cutting edge of hacking techniques and defensive strategies.
|
By Chris Clements
Imagine for a moment that your home has a rodent problem. To address this, you install a fancy system designed to automatically detect and trap animals before they can roam around your house and cause any damage. The system seems to work well; from time to time, you arrive home to find a mouse or a squirrel caught by the device. No big deal, right? Lots of small critters about and the system is working as designed to catch them.
|
By CISO Global
High-tech pest control? Or cyber threat detection and response? VP of Solutions Architecture, Chris Clements, shares his thoughts about how context and expertise make all the difference when responding to a threat alert. What would you do if you came home to a polar bear in your kitchen?
|
By CISO Global
Learn more about Custom Cyber Awareness Training form CISO Global.
|
By CISO Global
CISO Global’s VP of Solutions Architecture Chris Clements shares his thoughts on incident response.
|
By CISO Global
Hoping for the best but preparing for the worst is a good rule for many situations. The same applies to an incident response plan. Not every organization that develops an incident response plan has used it, but those who have needed to use one are happy they had it and they're a lot better off than those who had no plan. Join Gary Perkins and Chris Clements on April 3rd in discussing the importance of creating an incident response plan. Learn steps you can take to prepare your organization in the instance of a cybersecurity incident.
|
By CISO Global
2025 may seem far off, but the reality is that CMMC is no longer on the distant horizon; it is knocking on our door. In an industry where the compliance process is long and the market of assessors is far fewer than needed, taking a proactive approach is a must. Join CISO Global's Gary Perkins, Baan Alsinawi, Tom Cupples, and special Guest Ben Bryan on February 21st as they discuss CMMC 2.0, the new rules and guidelines that come with it, and what your compliance timeline may look like.
|
By CISO Global
How vulnerable are credit unions, the bedrock of community finance, to rapidly advancing cyber threats? Very. Join CISO Global's Chris Clements, Tigran Safari, James Montagne, and special guest Iwona Karpeta as they discuss recent attacks against credit unions, how they responded, and how their customers were impacted. Speakers: Chris Clements is the VP of Solutions Architecture for CISO Global. Chris has spent more than two decades working in the information security field and has a wide range of experience, including business management, sales, product, and service delivery.
|
By CISO Global
Too good to be true? Then it probably is. If you think that link is suspicious, don’t click it. A friendly reminder from CISO Global — Always be sure to verify links, secure your passwords, and stay informed#cybersecurity #ciso #phishingattacks.
|
By CISO Global
2023 has been a busy year for cybersecurity. From changes in compliance and regulations to the ever-increasing number of attacks, there's a lot to talk about. Join us in reviewing the highs and lows of cybersecurity in 2023 and what we can expect to see as we enter 2024. Hear expert advice and commentating from Chris Clements, Gary Perkins, and Jerald Dawkins, Ph.D. Jerald Dawkins, Ph.D, is the Chief Technology Officer for CISO Global. He currently holds three patents for network gateway messaging systems and methods for tokenization to support pseudonymization of sensitive data and services.
|
By CISO Global
PCI DSS 4.0 is coming, and getting your organization up to speed will be no small task. Don't wait until the last minute. Hear Payment Card Industry (PCI) Qualified Security Assessors Brian Dean and Joe Moser as they explain the key differences between PCI 4.0 and PCI 3.2.1, what to expect with the new release, and which steps you need to take right away to prepare.
|
By CISO Global
A leader in cybersecurity and compliance services, CISO Global brings together expert practitioners and thought leaders to provide tailored solutions that drive cyber resilience. The company’s top-tier talent spans geographies, specialties, industries, regulatory frameworks, and focus areas and includes auditors, compliance specialists, certified forensics experts, ethical hackers, security engineers, and around-the-clock analysts.
- November 2024 (1)
- October 2024 (4)
- September 2024 (3)
- August 2024 (4)
- June 2024 (1)
- May 2024 (8)
- April 2024 (5)
- March 2024 (6)
- February 2024 (8)
- January 2024 (5)
- December 2023 (5)
- November 2023 (8)
- October 2023 (6)
- September 2023 (8)
- August 2023 (12)
- July 2023 (7)
- June 2023 (5)
- May 2023 (14)
- April 2023 (9)
- March 2023 (3)
CISO experts help you meet your cybersecurity, compliance, and IT goals together, so you make more progress, faster.
Our specialists will help you find both gaps and opportunities in your current security strategy, explaining root causes along the way. Then, you’ll have full visibility into progress as we help you take steps that drive the greatest impact. It’s that simple.
With a comprehensive suite of cybersecurity, compliance, and security engineered solutions, we work across disciplines to help you reach your goals.
- Strategy & Risk Solutions: Working with a fully integrated advisory, security, and compliance partner takes the guesswork out of security program development, helping to keep your team on track to reach milestones and meet security goals.
- Cyber Defense Operations: All global Cyber Defense Operations are delivered from our own in-country, state of the art 24x7x365 Security Operations Centers (SOC).
- Security Architecture & Engineering Solutions: CISO Global provides advanced firewall management as well as patch and vulnerability management.
- Readiness & Resiliency Solutions: Our security experts and other industry leaders will partner with you to help create a culture of cybersecurity within your organization.
Cybersecurity is a Culture, not a Product.