
Podcast Episode 18: Video and Search Security
The post Podcast Episode 18: Video and Search Security appeared first on CCSI ... Read More

Podcast Episode 17: Current and Future Concerns of Securing IoT Devices
The post Podcast Episode 17: Current and Future Concerns of Securing IoT Devices appeared first on CCSI ... Read More

Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring
The post Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring appeared first on CCSI ... Read More

Policy and Procedures – Security Compliance
All organizations have policies and procedures on how particular tasks and goals are established within the organization. The issue here is many of these are either word of mouth or haven’t been written down. This leads to having subjective policies and procedures that morph over time based off a loose ... Read More

Developing Cybersecurity Muscle Memory with Table Top Sessions
The post Developing Cybersecurity Muscle Memory with Table Top Sessions appeared first on CCSI ... Read More

Just Patch Already… It’s Not that Easy
We’ve all heard it before, “Just patch all the things and you’ll be perfectly fine” and there’s a lot of truth to this statement; it’s also extremely shortsighted. If you’re working in a large enterprise or an organization that uses unique equipment for business functions it’s almost impossible to follow ... Read More

Second Annual Long Island CISO Roundtable
We recently held our second annual CISO roundtable that brought in the attendance of fifteen CISO’s for a candid conversation regarding their concerns, challenges and advice on protecting their organization. Last year’s roundtable showed that Long Island has a security community that’s hungry to learn and grow from each other ... Read More

Training Wheels are Off – NYS DFS Transitional Period Finished
The two-year transitional period implemented by the New York State Department of Financial Services (NYS DFS) regarding their Cybersecurity framework, 23 NYCRR 500, finished this past March 1, 2019. This doesn’t mean the work ends here, but essentially it’s just getting started. The state of New York allowed institutions, or ... Read More

Legally Dangerous Attackers
Malicious actors are consistently and persistently looking for new avenues to compromise sensitive data and they’ve found one such entry through legal firms. Legal firms play a unique role within the economy by being at the center of personal and business-related transactions. Legal firms are involved with large enterprises, governments, ... Read More

Podcast: CISO Speak – Vulnerability Management in the Cloud
The post Podcast: CISO Speak – Vulnerability Management in the Cloud appeared first on CCSI ... Read More