Red Flags Reimagined; The Evolution of Insider Threat

Employees are choosing permanent remote work, the ‘great resignation’ is overwhelming offboarding resources, nation states and criminal groups are getting bolder at recruiting employees to steal and ransom data, and COVID and political divisions are increasing employee stress, distraction, and disenfranchisement. To borrow from the cybersecurity ‘CIA Triad’ model, the Confidentiality, Integrity and Availability of […]

Security Convergence Fireside Chat w/ John McClurg

We live in exponential times. In our generational lifetime, we have seen innovations such as the internet and smartphones transform and enable business in ways never seen before. As part of the modernization transformation, we have had to grapple with the digital shifts in technology we never had to deal with previously, and inheriting the […]

What happens when 911 gets Hacked?

911 emergency call delivery systems are currently transforming to a next generation of call delivery technology known as Next Generation 911 (NG911). 911 emergency call systems have typically been protected from cyber-attack because 911 calls were delivered through a traditional telephone company landline system a/k/a ‘Legacy 911’ which relies on dedicated circuits and analog data […]

Has Detect & Respond Failed Us?

Companies using detect and respond as a security strategy are getting hacked at an increasingly alarming rate. We have more cybersecurity companies and products on the market than ever. So why are the numbers of successful attacks increasing and not decreasing? Why are the four key paths leading to compromise: Credentials, Phishing, Exploiting vulnerabilities, and […]

12 Monkeys: Curtains for Security Theatre

The desire to be secure has been replaced by the desire to be blameless. Return to the original purpose of security; protecting people. Then explore the convergence of compliance and technical security capabilities as they relate to business, data, people, and processes. What is our ultimate goal? How do we reshape the governance landscape to […]