Governance, Risk & Compliance - Security Boulevard https://securityboulevard.com/category/blogs/governance-risk-compliance/ The Home of the Security Bloggers Network Mon, 02 Sep 2024 15:19:22 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Governance, Risk & Compliance - Security Boulevard https://securityboulevard.com/category/blogs/governance-risk-compliance/ 32 32 133346385 Demystifying SOC 2 Compliance for Startups: A Simple Guide https://securityboulevard.com/2024/09/demystifying-soc-2-compliance-for-startups-a-simple-guide/ https://securityboulevard.com/2024/09/demystifying-soc-2-compliance-for-startups-a-simple-guide/#respond Mon, 02 Sep 2024 15:19:22 +0000 http://securityboulevard.com/?guid=1d5c1a449f9d1a88c9ca3c23540456a3 Navigating the world of SOC 2 compliance can seem daunting for startups. This article breaks down the complexities, explaining what SOC 2 is, why it's important, and how your startup can achieve and maintain compliance without breaking the bank or slowing down growth.

The post Demystifying SOC 2 Compliance for Startups: A Simple Guide appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/09/demystifying-soc-2-compliance-for-startups-a-simple-guide/feed/ 0 2029464
4 Tips for Optimizing Your GRC Strategy https://securityboulevard.com/2024/08/4-tips-for-optimizing-your-grc-strategy/ Sat, 31 Aug 2024 12:35:06 +0000 https://securityboulevard.com/?p=2029414 GRC, strategies, best practices, risk management,

Why GRC strategies are often not as effective as they could be, and specific practices businesses can adopt to improve GRC operations.

The post 4 Tips for Optimizing Your GRC Strategy appeared first on Security Boulevard.

]]>
2029414
China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target https://securityboulevard.com/2024/08/china-cyberwar-coming-versas-vice-volt-typhoons-target/ Wed, 28 Aug 2024 16:57:30 +0000 https://securityboulevard.com/?p=2029126 A Chinese flag flies on a high pole

Xi whiz: Versa Networks criticized for swerving the blame.

The post China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target appeared first on Security Boulevard.

]]>
2029126
Do cybersecurity certifications still deliver? Experts share 6 key insights https://securityboulevard.com/2024/08/do-cybersecurity-certifications-still-deliver-experts-share-6-key-insights/ https://securityboulevard.com/2024/08/do-cybersecurity-certifications-still-deliver-experts-share-6-key-insights/#respond Wed, 28 Aug 2024 16:38:41 +0000 https://www.reversinglabs.com/blog/are-traditional-cybersecurity-certifications-still-worth-your-time Do cybersecurity certifications still deliver? Experts share 6 key insights

Cybersecurity certifications continue to open doors and shape careers in security operations (SecOps). However, the mileage that individuals and organizations get out of certs can vary by industry, the specific demands of the job, and the practical experience needed to tackle real-world challenges.

As a result, there's growing recognition among industry professionals and employers that certification achievements must be balanced with hands-on experience. An ISC2 survey of 14,000 cybersecurity professionals showed that respondents retain a relatively high level of interest in obtaining cybersecurity certifications: 16% described themselves as currently pursuing a non-vendor-specific certification such as ISACA, CompTIA, CISSP, and ISC2, and 17% said they are pursuing vendor-specific programs such as those from Microsoft and Cisco. Another 40% said they plan to pursue a certification within the next six months. Of those expressing interest in certs, 65% described their primary motivation as skills improvement; 53% said they want to stay current with trends, and 50% are looking for career and professional development.

But with big changes facing SecOps teams, are certifications still relevant? Here's what top industry experts say.

The post Do cybersecurity certifications still deliver? Experts share 6 key insights appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/do-cybersecurity-certifications-still-deliver-experts-share-6-key-insights/feed/ 0 2029239
Not a SOC FAQ! This is SOC FMD! https://securityboulevard.com/2024/08/not-a-soc-faq-this-is-soc-fmd/ https://securityboulevard.com/2024/08/not-a-soc-faq-this-is-soc-fmd/#respond Tue, 27 Aug 2024 23:36:17 +0000 https://medium.com/p/e9eeee2429e1 Somebody asked me this profound question that (a) I feel needs an answer and that (b) I’ve never answered in the past:

If you run a SOC (or an equivalent D&R team), what things should you require (demand, request, ask, beg … depending on the balance of corporate power) of other teams?

Dall-E via Copilot image gen, steampunk

Think of this not as SOC FAQs, but SOC FMDs — Frequently Made Demands…

To frame this a but, this is not about executive sponsorship (you should always “request” executive support, otherwise some efforts are not even worth starting, frankly), or other SOC success “pre-requisites.” This is about the key ongoing “asks” SOC makes of other teams and departments so that it has a chance of being successful with its mission over time.

So when asked this question, my ex-analyst mind went and produced a 3 pillar framework:

  1. Assets information
  2. Useful signals delivery
  3. Triage partnership

Let’s review these three.

Assets Information

If a SOC is tasked with detection and response, they better know the lay of the land that they are defending. “Defender’s Advantage” and all that. If you don’t know the terrain better than the attacker, you already lost.

There is of course a lot of nuance to it, but at some basic level, there should be a way for a team deploying anything to report this to SOC for coverage, and for a SOC to ask a team for their list of assets to be monitored for threats. Assets here may mean servers (hey, the 1990s are NOT reality over, joking aside), cloud assets, SaaS services, applications, etc (it would also be handy for ZT efforts).

Summary: if your mission is to protect assets, ask for the list of assets (sorry, this came out very Capt Obvious, but this is in fact missed in some cases)

Useful Signals Delivery

You should ask for logs! Duh, is that you, Captain Obvious, again? Well, you should ask for specific logs relevant to your mission, you should ask for compliance with a sensible logging policy, and to cover custom applications, you should ask for compliance with a sensible (this means: short!) log standard.

Don’t just ask for “logs”, ask for logs and other telemetry you can use given the tools, process and people you have. Ask for relevant context data too. If you need EDR deployed, ask. If you need to sniff traffic because EDR cannot go there, ask for NDR.

If you need logging enabled, ask for types you need (logging policy, short and sweet). If you need them delivered, ask for access to supported log pipelines or mechanisms. If they need to develop logs for custom applications, offer a log standard, then ask for compliance with it (log standard must be short and thus implementable by unmotivated developers…)

Don’t fall victim to “application is deployed, app owner never provides logs, app owner assumes that SOC will detect any threat” syndrome (this is real, please don’t laugh!). If you cannot get the logs, ask for Plan B (you do have a Plan B?).

Basic Plan B examples may include: I really want EDR here, but I can’t have it; I can then ask for logs + NDR to mitigate the visibility gap. Another: I really want logs from this application, but can’t have it. I can get OS logs, would it help? Yes, but only if I get these events, and also get logs from another system that this one connects to.

Triage Partnership

You have assets, you have signals … what do you do with all this? Well, to be very fair to many solid SOC teams, sometimes the answer is “not a whole lot” or “who the hell knows.” Unless… unless the team that runs the system (IT, DevOps, etc) and/or the team that owns the system (business, etc) helps figure out what the thing is saying via those logs.

This means you do need to ask for alert triage help. Yes, I know, I know: many SOCs are not used to this, and prefer to ad hoc it for those “rare” cases where they need help. My favorite example where ad hoc does NOT work well is DLP alerts. Back in my analyst days, there was a lively debate among the analysts covering DLP about who should own DLP, security or business (!). In that vision, even if security owns DLP, business has to play an equal role otherwise “X emailed Y about Z” and “X uploaded Y to Z” alerts destroy the SOC due to its lack of capability to understand whether this is apocalyptic, merely bad, or perfectly normal, just rare.

Distributed alert response is a thing at some elite D&R teams (famous example, more current example). But even if SOC owns triage, it needs to ask for help. This is needed even more for data related alerts (What is this data and how valuable is it? Can it go out that way?) and application security alerts (What is the app threat model? Can the app do that? Should it?). As a side note, there is probably another blog here about how to plan appsec to D&R collaboration…

Anything BIG I missed? Anything else you as a SOC leader demanded from other units and departments?

Related blogs:


Not a SOC FAQ! This is SOC FMD! was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post Not a SOC FAQ! This is SOC FMD! appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/not-a-soc-faq-this-is-soc-fmd/feed/ 0 2029083
‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril https://securityboulevard.com/2024/08/telegram-terrorgram-grid-richixbw/ Tue, 27 Aug 2024 17:19:11 +0000 https://securityboulevard.com/?p=2028965 Sign reads, “Danger: High Voltage!”

Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize.

The post ‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril appeared first on Security Boulevard.

]]>
2028965
Navigating SEBI’s 2024 Updated Cybersecurity Framework: Key Revisions https://securityboulevard.com/2024/08/navigating-sebis-2024-updated-cybersecurity-framework-key-revisions/ https://securityboulevard.com/2024/08/navigating-sebis-2024-updated-cybersecurity-framework-key-revisions/#respond Tue, 27 Aug 2024 05:39:13 +0000 https://kratikal.com/blog/?p=11070 The Securities and Exchange Board of India (SEBI) has issued a notification regarding the Cybersecurity and Cyber Resilience Framework for Market Infrastructure Institutions (MIIs). This framework mandates MIIs to establish robust cybersecurity and resilience policies to secure their infrastructure against cyber threats. Key aspects include setting up a Cyber Security Operation Center (C-SOC), ensuring regular […]

The post Navigating SEBI’s 2024 Updated Cybersecurity Framework: Key Revisions appeared first on Kratikal Blogs.

The post Navigating SEBI’s 2024 Updated Cybersecurity Framework: Key Revisions appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/navigating-sebis-2024-updated-cybersecurity-framework-key-revisions/feed/ 0 2029065
Pig Butchering at Heart of Bank Failure — CEO Gets 24 Years in Jail https://securityboulevard.com/2024/08/shan-hanes-htsb-ceo-pig-butchering-richixbw/ Fri, 23 Aug 2024 16:54:40 +0000 https://securityboulevard.com/?p=2028729 A pig in a muddy farm field

Oink, oink, FAIL—you’re in jail: Kansas bank chief exec Shan Hanes stole money from investors, a church and others to buy cryptocurrency to feed a scam.

The post Pig Butchering at Heart of Bank Failure — CEO Gets 24 Years in Jail appeared first on Security Boulevard.

]]>
2028729
What is ISO 27018? Importance of Protecting PII in Cloud? https://securityboulevard.com/2024/08/what-is-iso-27018-importance-of-protecting-pii-in-cloud/ https://securityboulevard.com/2024/08/what-is-iso-27018-importance-of-protecting-pii-in-cloud/#respond Fri, 23 Aug 2024 07:29:30 +0000 https://kratikal.com/blog/?p=11063 ISO 27018 is an international standard for the protection of Personally Identifiable Information in cloud computing environments. However, unlike the broad scope of the ISO/IEC 27001 standard, it goes further to provide detailed and specific guidelines for cloud service providers on how to manage PII more securely, in conformance with global privacy regulations. With organizations […]

The post What is ISO 27018? Importance of Protecting PII in Cloud? appeared first on Kratikal Blogs.

The post What is ISO 27018? Importance of Protecting PII in Cloud? appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/what-is-iso-27018-importance-of-protecting-pii-in-cloud/feed/ 0 2028774
A Crash Course on Hyperproof’s GRC Maturity Model https://securityboulevard.com/2024/08/a-crash-course-on-hyperproofs-grc-maturity-model/ https://securityboulevard.com/2024/08/a-crash-course-on-hyperproofs-grc-maturity-model/#respond Thu, 22 Aug 2024 18:55:50 +0000 https://hyperproof.io/?p=31437 Something has been missing in the governance, risk, and compliance (GRC) space: the ability to truly understand an organization’s GRC maturity and the steps it would take to build the business case for change. As a CISO, I was surprised to find that there was no published, widely adopted maturity model for Governance, Risk, and...

The post A Crash Course on Hyperproof’s GRC Maturity Model appeared first on Hyperproof.

The post A Crash Course on Hyperproof’s GRC Maturity Model appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/a-crash-course-on-hyperproofs-grc-maturity-model/feed/ 0 2028716