From the Winter 2019 Issue

Get into the Nitty Gritty Of Hybrid Cloud Management

Author(s):

Diana Vantur, Technology Analyst, TatvaSoft UK

Dianna Vantur feature image

IT managers can’t take their eyes off hybrid cloud management. Hybrid cloud is the latest technology fad. In a hybrid cloud implementation, enterprises creating a computing environment is a mix of capabilities deployed across both public and private clouds. Cloud computing has paid dividends in terms of increased productivity, cost reduction and easy scalability. Hybrid … Read more

From the Winter 2019 Issue

Orange is Not the New Black Hat

Author(s):

Griffin Weaver, Associate Attorney, USAA

Jason Edwards, Compliance Director - Cybersecurity, USAA

JasonEdwards-feature-image-wn19

As a cyber professional, the perks that come with working for a large company are many – new equipment, latest technology, big salary, and free soda, to name a few. However, one perk a company cannot offer, regardless of size, is a get out of jail free card for violations of the law. Just take … Read more

From the Winter 2019 Issue

Data Classification Business Process Changes Part 3 Conclusion

Author(s):

Bill Bonney, CISO Desk Reference Guide, CISO DRG Venture

BillBonney-feature-image-wn19

In the first article in this series, “Data Classification is the Key to Data Protection,” I asserted that “Data gains value from its use, not from being hidden and protected.” In the second article, “Data Classification That Honors Business Value,” I suggested that five new attributes be added to the standard five-tier (public, internal use … Read more

From the Fall 2018 Issue

Small Business Strategies for Protecting Computer Credentials

Author(s):

Eric Hipkins, Founder and Chief Executive Officer, R9B

Hipkins-article-header-165991109

Small businesses are rapidly becoming a prime target for malicious actors. The 2018 Verizon Data Breach Investigations Report (DBIR) estimated 58% of all breaches in 2017 took place within small businesses.1 From some perspective, the 2016 DBIR mentioned small businesses only in passing and the 2017 version pointed to small businesses as making up more … Read more

From the Fall 2018 Issue

The Industrialization of Cybersecurity Red and Blue Teaming

Author(s):

Brian Contos, CISO & VP Technology Innovation, Verodin

brian-contos-article-header

The industrial revolution was brought on by purpose-built machinery and automation. A similar revolution has occurred in cybersecurity, leading to the industrialization of red and blue teaming. In large part, this industrialization has been realized through security instrumentation platforms (SIP). Security Instrumentation Platforms SIPs validate that a security system is working as needed: providing foundational … Read more

From the Fall 2018 Issue

Data Classification That Honors Business Value, Part 2

Author(s):

Bill Bonney, CISO Desk Reference Guide, CISO DRG Venture

Bill-Bonney-article-header

Why Is Data Valuation Important? In an excellent article in the MIS Sloan Management Review1, the authors cite three reasons why data valuation is important – to guide decisions around 1) direct monetization, 2) internal investments, and 3) mergers and acquisitions. As noted in a previous article in this series2, there is a fourth reason … Read more

From the Summer 2018 Issue

Cybersecurity Compliance: Defending Your Small Business

Author(s):

Joy Galliford, Vice President of Cyber Programs, Joy Galliford

Young-hacker-in-data-security--168105173

We see it in the news almost daily — malicious cyber activity, security breaches, and privacy violations. But that only impacts large enterprises like Target, Citibank, and Facebook, right? Wrong. In an ever-evolving digital world, small businesses have their own set of cybersecurity responsibilities that must be met in order to do business. This is … Read more

From the Summer 2018 Issue

Building a Security Program for Small to Medium Businesses

Author(s):

Wilson Bautista, Director of Information Technology and Information Security, i3 Microsystems, a division of i3 Electronics

programer-block-header

According to a recent study from 2017 by the Enterprise Strategy Group1, 45 percent of organizations have a critical shortage of cybersecurity skills. This impacts the ability of IT teams supporting small and medium businesses (SMB) to acquire talent to fill their cybersecurity gaps. As more organizations are improving their third-party risk assessment programs, there … Read more

From the Summer 2018 Issue

Data Classification is the Key to Data Protection, Part I

Author(s):

Bill Bonney, CISO Desk Reference Guide, CISO DRG Venture

bill-bonney-data-protection

“No, no!” said the Queen. “Sentence first – verdict afterwards.” “Stuff and nonsense!” said Alice loudly. “The idea of having the sentence first!” The value proposition for data is not in its protection (sentence), but in its use (verdict). In this series of articles, we’re going to explore an alternate value proposition for data classification … Read more