Insurance Occurrence Assurance?

Insurance Occurrence Assurance?

The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection for the operational state of your organization than cyber security insurance alone. To put it another way, insurance ... Read More
Security Beyond The Perimeter

Security Beyond The Perimeter

Whether we like it or not, the way we architect, utilize, and secure the networks and systems under our control has changed. When servers were safely tucked away behind corporate firewalls and perimeter-deployed intrusion prevention controls, organizations became complacent and dependent on their host security. Unfortunately, inadequately architected security controls ... Read More
The Hay CFP Management Method – Part 2

The Hay CFP Management Method – Part 2

| | articles
I’ve had a lot of positive feedback from my first post which explained how to create the Trello board to track your Call For Paper (CFP) due dates, submissions, and results. In this post, I’ll explain how to create the cards and populate them with the required data to better ... Read More
The Hay CFP Management Method

The Hay CFP Management Method

| | SBN News, Security Research
People often ask me how I manage the vast number of abstracts and security call for papers (CFPs) submissions. So I thought I’d create a blog post to explain my process. For lack … Continue reading The Hay CFP Management Method → The post The Hay CFP Management Method appeared ... Read More
Detect and Prevent Data Exfiltration Webinar with Infoblox

Detect and Prevent Data Exfiltration Webinar with Infoblox

| | News, SBN News, Webinar
Please join SANS Institute Instructor and LEO Cyber Security Co-Founder & CTO Andrew Hay and Infoblox Security Product Marketing’s Sam Kumarsamy on Thursday, August 17th, 2017 at 1:00 PM EDT (17:00:00 UTC) as they present a SANS Institute webinar entitled Detect & Prevent Data Exfiltration: A Unique Approach. Overview Data ... Read More
Petya Ransomware: What You Need to Know and Do

Petya Ransomware: What You Need to Know and Do

Unless you've been away from the Internet earlier this week, you've no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday ... Read More