Ransomware Protection Checklist

Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring

The post Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring appeared first on CCSI ... Read More
Matthew Pascucci

Policy and Procedures – Security Compliance

All organizations have policies and procedures on how particular tasks and goals are established within the organization. The issue here is many of these are either word of mouth or haven’t been written down. This leads to having subjective policies and procedures that morph over time based off a loose ... Read More
Matthew Pascucci

Developing Cybersecurity Muscle Memory with Table Top Sessions

The post Developing Cybersecurity Muscle Memory with Table Top Sessions appeared first on CCSI ... Read More
Matthew Pascucci

Just Patch Already… It’s Not that Easy

We’ve all heard it before, “Just patch all the things and you’ll be perfectly fine” and there’s a lot of truth to this statement; it’s also extremely shortsighted. If you’re working in a large enterprise or an organization that uses unique equipment for business functions it’s almost impossible to follow ... Read More
Matthew Pascucci

Second Annual Long Island CISO Roundtable

We recently held our second annual CISO roundtable that brought in the attendance of fifteen CISO’s for a candid conversation regarding their concerns, challenges and advice on protecting their organization. Last year’s roundtable showed that Long Island has a security community that’s hungry to learn and grow from each other ... Read More
Matt Pascucci

Training Wheels are Off – NYS DFS Transitional Period Finished

The two-year transitional period implemented by the New York State Department of Financial Services (NYS DFS) regarding their Cybersecurity framework, 23 NYCRR 500, finished this past March 1, 2019. This doesn’t mean the work ends here, but essentially it’s just getting started. The state of New York allowed institutions, or ... Read More
Matt Pascucci

Legally Dangerous Attackers

Malicious actors are consistently and persistently looking for new avenues to compromise sensitive data and they’ve found one such entry through legal firms. Legal firms play a unique role within the economy by being at the center of personal and business-related transactions. Legal firms are involved with large enterprises, governments, ... Read More
Matthew Pascucci

Podcast: CISO Speak – Vulnerability Management in the Cloud

The post Podcast: CISO Speak – Vulnerability Management in the Cloud appeared first on CCSI ... Read More
Matt Pascucci

So You want to Work in Cybersecurity, eh?!

There is a massive need for cybersecurity professionals today and the need is only growing. We’ve seen estimates of anywhere between 2-3 million vacant jobs over the next three years. The demand is definitely bullish and showing no signs of stopping. With this being said, breaking into an industry is ... Read More
Matthew Pascucci

Why a Zero-trust Network with Authentication is Essential

Zero-trust networks are often deemed compromised and untrusted, making authentication variables essential to security. Expert Matthew Pascucci explains a zero-trust security model. In the past, we’ve done a great job of making networks accessible. But with this increased availability, we’ve opened the door for attackers to move more easily around ... Read More