Matthew Rosenquist, Author at Security Boulevard https://securityboulevard.com/author/matthew-rosenquist/ The Home of the Security Bloggers Network Mon, 26 Aug 2024 23:28:00 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Matthew Rosenquist, Author at Security Boulevard https://securityboulevard.com/author/matthew-rosenquist/ 32 32 133346385 Evolving Cybersecurity: Aligning Strategy with Business Growth https://securityboulevard.com/2024/08/evolving-cybersecurity-aligning-strategy-with-business-growth/ https://securityboulevard.com/2024/08/evolving-cybersecurity-aligning-strategy-with-business-growth/#respond Mon, 26 Aug 2024 23:28:00 +0000 http://securityboulevard.com/?guid=6a9d1ec1f56c3f406e43234b9f99a85a

The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacking for tomorrow. Organizations must stay ahead of these changes to protect their assets and data effectively. To thrive, cybersecurity strategies need to evolve — moving beyond the reactive and fragmented approaches that are often commonplace. Instead, businesses must prioritize strategic foresight, adaptability, and maturity in their security programs.

Cybersecurity risks are continually growing. CISOs, CIOs, CEOs, and Boards are under immense pressure to manage these threats while simultaneously enabling business success. The challenge is significant, but with the right approach and insights, organizations can achieve greater security and unlock new value that is necessary for sustainability.

Here are several areas where the cybersecurity industry must evolve to meet these demands:

1. Strategic Alignment

Cybersecurity is no longer just a technical issue — it’s a business issue. The industry must evolve to ensure cybersecurity programs are directly aligned with an organization’s strategic goals. This involves defining clear and impactful cybersecurity objectives that resonate with the C-suite and Board members. It’s essential that cybersecurity is seen as a business enabler rather than a cost center, helping drive business outcomes while protecting critical assets.

2. Building Dynamic Capabilities

Static security programs are no longer sufficient in today’s fast-evolving threat landscape. Organizations need dynamic approaches to cybersecurity that adapts to emerging risks and threats. The industry must foster the development of continuously evolving security programs that are agile enough to respond to new challenges without compromising business operations. Building a strategic and adaptable cybersecurity framework is crucial for long-term success.

3. Optimizing Risk and Costs

Effective cybersecurity does not have to be exorbitantly expensive. Organizations should focus on identifying areas where risk mitigation can be improved while simultaneously optimizing costs. The evolution of cybersecurity practices will increasingly involve finding the optimal balance between robust security measures, friction to users, and cost efficiency, allowing organizations to manage their security investments wisely without sacrificing protection.

4. Sustainable Risk Management

Organizations must build cybersecurity programs that are not only effective but also sustainable. The future of cybersecurity lies in the creation of flexible, long-term risk management strategies that can scale with the organization. By ensuring that security efforts are adaptable and sustainable, organizations can continue to thrive in the face of changing threats and business needs. The focus must shift from quick fixes to long-term risk management.

5. Enhancing Maturity and Value

The maturity of a cybersecurity program is a key indicator of an organization’s ability to handle threats effectively and efficiently in alignment with expectations. The cybersecurity industry needs to guide organizations on their journey toward greater maturity, helping them move from reactive measures to proactive and strategic cybersecurity initiatives. This evolution in maturity brings not only better security but also enhances overall business value, providing organizations with a competitive edge in their industry.

6. Executive Translation of Cybersecurity Concepts

One of the biggest challenges in cybersecurity is the communication gap between technical teams and executive leaders. For the industry to truly excel, cybersecurity professionals must be able to translate complex cybersecurity concepts into language that resonates with both executives and employees. This ensures that risk-based decisions are understood and embraced across the organization, leading to smarter and more informed business practices.

Conclusion

The cybersecurity industry must evolve in key areas to remain effective and relevant in today’s challenging landscape. Strategic alignment, dynamic capabilities, cost optimization, sustainable risk management, maturity growth, and executive communication are all areas where organizations can excel. By embracing these approaches, businesses can enhance their cybersecurity programs and not only reduce risk but also create value and drive success.

If your organization is ready to assess, improve, or enhance the maturity of its cybersecurity program, seeking expert guidance can help navigate this complex evolution. As a cybersecurity strategist, I offer flexible consulting engagements designed for CISOs, C-suites, and Boards to help drive meaningful change. Together, we can advance your security efforts and achieve sustainable growth in cybersecurity maturity.

The post Evolving Cybersecurity: Aligning Strategy with Business Growth appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/evolving-cybersecurity-aligning-strategy-with-business-growth/feed/ 0 2028932
Learning from CrowdStrike’s Quality Assurance Failures https://securityboulevard.com/2024/07/learning-from-crowdstrikes-quality-assurance-failures/ Thu, 25 Jul 2024 20:04:00 +0000 http://securityboulevard.com/?guid=e54ad2d4c8effec5e127265a6d939613  

Let’s talk about CrowdStrike’s quality assurance failures! Thanks to Help Net Security for publishing my opinion piece. Take a look for a more in-depth explanation of how the bad update made it to over 8 million devices and caused widespread global outages.

CrowdStrike has released preliminary details of how their bad update made it to client systems, which caused the BSODs. It showcases they have a complex product release architecture, which in this case failed. Improvements need to be made and I am concerned that their plans for incremental changes to a flawed Quality Assurance architecture won’t result in the desired long-term outcomes.

CrowdStrike has a good reputation and leadership, as showcased by the CEO George Kurtz who quickly came out to take responsibility and rally his team to help their customers. There have been many companies, including security companies, who were not transparent or timely when their products caused problems. In fact, it seems more common to initially deny, downplay, or blame others. So, what George did is truly wonderful. It is a testament to CrowdStrike’s work ethics.

However, this is a major outage and CrowdStrike needs to revisit their preliminary improvement plans to account for a flawed strategy that allows for dangerous code to make it to the endpoints — something that should never be allowed to happen.

The world is watching and lessons-learned will likely be used to help improve the operating practices across the industry.

Take read at the article and let me know your thoughts and concerns!

https://www.helpnetsecurity.com/2024/07/25/crowdstrike-quality-assurance-failures/

The post Learning from CrowdStrike’s Quality Assurance Failures appeared first on Security Boulevard.

]]>
2025556
New Microsoft Recovery Tool for CrowdStrike Issue on Windows Endpoints https://securityboulevard.com/2024/07/new-microsoft-recovery-tool-for-crowdstrike-issue-on-windows-endpoints/ Mon, 22 Jul 2024 20:50:00 +0000 http://securityboulevard.com/?guid=599ac7b6825b82e172e452b6d6d29470  

Not sure who need this resource, but Microsoft updated its
Recovery Tool for the CrowdStrike issue on Windows endpoints:

Here is the link to the Microsoft Tech Community Support
Site:

https://techcommunity.microsoft.com/t5/intune-customer-success/new-recovery-tool-to-help-with-crowdstrike-issue-impacting/ba-p/4196959

As a former cybersecurity Incident Commander for Intel, here
are my additional recommendations:

  •          Verify the source of every tool or procedure you
    plan on using!
  •          For a large organization, have a single
    accountable tech savvy group create the recovery process and don’t allow other
    groups to home-brew their own fixes
  •          Test the fix out on your different builds
  •          Formalize the step-by-step process for your
    environment – break down instructions to keep each step simple
  •          Make sure you have accounted for hard drive
    encryption hurdles (ex. Bitlocker or other 3rd party vendors), if
    applicable
  •          Roll-out the recovery in phases, starting with
    non-critical systems, just in case there are unforeseen issues and system data
    loss
  •          Have a process to record and report which
    systems have successfully been restored
  •          If things go sideways, STOP and seek more
    advanced assistance

Happy hunting!

The post New Microsoft Recovery Tool for CrowdStrike Issue on Windows Endpoints appeared first on Security Boulevard.

]]>
2025140
Massive CrowdStrike IT Outage Has Global Implications for Cybersecurity https://securityboulevard.com/2024/07/massive-crowdstrike-it-outage-has-global-implications-for-cybersecurity/ Fri, 19 Jul 2024 20:06:00 +0000 http://securityboulevard.com/?guid=b7f7026097bc605834dc90d38658a0a3  

The world experienced a digital pandemic of systems going offline and displaying the dreaded Windows Blue Screen of Death (BSOD), due to a catastrophic failure caused by a flawed file in an update to CrowdStrike cybersecurity customers. The impacts have been obscenely widespread, with many banks, airlines, train stations, financial exchanges, news agencies, supermarkets, and health care providers to name a few.

CrowdStrike is used by almost 60% of Fortune 500 companies and over half of the Fortune 1,000. It is popular in the financial sector, with deployments in eight of the top 10 financial services firms. Many of the biggest technology, healthcare, and manufacturing companies are also customers.

So far, the faulty CrowdStrike update is not attributed to malicious activities, but the impacts have been massive, prompting social media to unofficially designate today as BSOD day!

Implications

This outage of CrowdStrike customers on Windows 10 systems reinforces three important aspects.

First, cybersecurity solutions need deep and privileged access to systems, making them more impactful if they are hijacked or malfunction. This access is necessary to make preventative defensive changes before attacks occur, to monitor for stealthy attacks, and to coordinate system-level remediation actions when necessary. But when things go wrong, those permissions then can cause equally impactful damages.

The computing stack is like a layered cake, with data at the top, followed by applications, virtual machines, operating systems, VM managers, firmware, and finally hardware at the bottom. The deeper you go the more potential for problems to be impactful and difficult to remedy. Cyber attackers try to get as far down the stack as possible because they can avoid detection from any layer above and are more difficult to evict. When errors occur, the same relevance applies.

Second, the risk of supply chain attacks is real, and depending on the vendor, they could be catastrophic. CrowdStrike is one of the biggest cybersecurity players in the industry. An accidental or malicious problem in their flagship product, as we have seen, can deliver widespread impacts to the most important sectors. Let’s be glad that this was simply a technical glitch. A malicious package inserted into an update could completely take over systems or permanently destroy them.

Third, bad updates, code bugs, and misconfigurations happen all the time. No software, firmware, or hardware company is immune. More effort is needed as part of development and quality assurance, but even for the best organizations, it is possible for a series of mistakes to be made. That is why it is important to not only invest in defense and prevention but also architect ways to securely recover and resolve issues when they arise.

A Perfect Storm

This event has a combination of attributes that amplify the impacts: the issue causes catastrophic system impacts (i.e. the dreaded BSOD), across a large number of systems, in Critical Infrastructure sectors, and the offending code possesses deep permissions within the computing stack.

This is the case we are seeing with Crowdstrike.

This outage reinforces the fact that cybersecurity solutions mitigate risks but also can become a source of risk. Mistakes were made. Trust was lost. The entire cybersecurity industry will be scrutinized, and that is probably the only good outcome of this mess.

The post Massive CrowdStrike IT Outage Has Global Implications for Cybersecurity appeared first on Security Boulevard.

]]>
2025020
AT&T Data Breach: Understanding the Fallout https://securityboulevard.com/2024/07/att-data-breach-understanding-the-fallout/ Fri, 19 Jul 2024 01:44:00 +0000 http://securityboulevard.com/?guid=1ca5d161a08caa3dce4ecc2530d848e4  

As an AT&T customer, I did receive the unwelcome news that they suffered a data breach.

Here is a rundown for what you should to know.

BREACH DETAILS

· This is a sizable data breach of about 109 million customers

· Call and text interactions from May 1, 2022 to October 31, 2022

· AT&T is blaming a 3rd party cloud platform — Snowflake

· FBI Investigating and 1 arrest has been made

· Hackers accessed and exfiltrated the files sometime from April 14th to 25th

· Telephone numbers and phone logs were acquired, but AT&T says call and text message content wasn’t exposed.

The breach does not contain customers’ personal information, like birthdays or social security numbers.

Apparently, AT&T Paid the ransom — which is not smart. Wired magazine reported that AT&T paid the hackers over $300,000 to delete the stolen information and provide video proof.

OVERALL RISK

Given that personal information was not exposed, the risk is nominal.

So far there is not conclusive proof that the data has been released in the wild, but that could change

Expect more phishing attacks

There could be some ramifications for those who need to keep their call logs secret — undercover agents, supreme court justices, cheating spouses, etc.

The geolocation data, which identifies the cellular towers that phones were connected to during activities, is interesting but likely not too valuable to attackers

SEC rules for mandatory shareholder notification were followed, with the US Government granting 2 delays to AT&T. Normally it is a 4 day rule.

AT&T has not deemed this breach a material event to its shareholders.

Overall, the scale of this breach is unfortunate, but the sensitivity of the data in not too worrying for the vast majority of those effected.

However, this breach does show an unfavorable trend in AT&T’s security posture.

ISSUES and RECOMMENDATIONS

AT&T, “Protecting customer data is a top priority. “ is not true. This is the second major breach in just 3 months, with 70 million customer’s affected back in April.

So, let’s talk about what I expect as a cybersecurity professional:

First, protect your data better! Use MFA, encrypt at rest, clean up the access permissions, institute data blocking for exfiltration

Second, remove all sensitive PII data you really don’t need. Why do you need my SSN, actual date of birth, the tower I most use during the day or evening, even my home address is questionable for my mobile phone and I pay electronically. Remove these. And if it is required by dated regulations, then drive the charge to have those regulations updated so all the telecommunications vendors aren’t a weak point for data harvesters.

Third, implement a data destruction policy to destroy old customer data. Do you really need to keep call logs of people dating back 2 years? I would argue there is likely a mound of data you want to have, but don’t actually need to have. Clean that up, lighten your servers, and focus on keeping your network up.

FALLOUT

AT&T is getting proficient at handling major data breaches, which is not really a compliment.

I hope its big competitors lean-in and invest in cybersecurity to showcase how they can protect their customers, thus leveraging security as a competitive advantage for consumers to choose a communications provider that really is making customer data protections a top priority!

AT&T, I will be considering how you protect my data when my contract is up and I look at other providers!

Be sure to like and follow me on LinkedIn and the Cybersecurity Insights channel

Follow Matthew on LinkedIn: https://www.linkedin.com/in/matthewrosenquist/

Follow for more Cybersecurity Insights: https://www.youtube.com/CybersecurityInsights

The post AT&T Data Breach: Understanding the Fallout appeared first on Security Boulevard.

]]>
2024861
Microsoft in Cybersecurity Leadership Crisis – Open Letter to the CEO https://securityboulevard.com/2024/07/microsoft-in-cybersecurity-leadership-crisis-open-letter-to-the-ceo/ Tue, 09 Jul 2024 20:57:00 +0000 http://securityboulevard.com/?guid=b4b41460b14be260e7a7837c499fb7fb  

There is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In fact, all indications are that the executive team is somewhat worried and bewildered at the diverse and numerous issues arising. After many embarrassing incidents, which recently culminated in the President of Microsoft being called to answer questions before Congress, the Board and senior executive team once again instituted security measures to resolve the problems. Confidence among the cybersecurity community was not high, as this was not the first time such promises were made. Shortly thereafter, more security failures occurred.

Microsoft has announced additional measures as part of their Secure Future Initiative, which was actually created in November last year to solve the previous embarrassing problems that plagued them in 2021–2023, in another attempt to stem the cybersecurity failures. Based upon events that happened in July 2023, the U.S. Cyber Safety Review Board criticized the company’s leadership and culture which led to a “cascade of Microsoft’s avoidable errors”. Since then, two more major breaches have occurred and a myriad of other unsettling security issues.

Highlights of their best hacks and missteps 2021–2024

· Jan 2021: Microsoft Exchange Server Vulnerability Leads to 60,000+ Hacks

· April 2021: 500 Million LinkedIn Users’ Data Scraped and Sold

· Aug 2021: Thousands of Microsoft Azure Customer Accounts and Databases Exposed

· Aug 2021: 38 Million Records Exposed Due to Microsoft Power Apps Misconfiguration

· Mar 2022: Lapsus$ Group Breaches Microsoft

· Oct 2022: 548,000+ Users Exposed in BlueBleed Data Leak

· July 2023: Chinese Hackers Breach U.S. Agencies Via Microsoft Cloud

· Sept 2023: 60k State Department Emails Stolen in Microsoft Breach

· Jan 2024: Microsoft Azure Breached by Russian Intelligence Group, Source Code Stolen

· May 2024: Microsoft Announces Recall Feature, a Privacy and Security Nightmare

· June 2024: Microsoft Fails to Renew Their Security Certificates for Office*

*Unexpected expiration of Microsoft security certificates has happened numerous times, causing disruption (including to Teams in Feb 2024 and 2020, and to Azure in 2023 and 2013).

Failures Ahead

Sadly, it is clear they are attempting to leverage the same flawed framework, that created the systemic issues, to somehow solve the problem. Well, the problem is leadership which does not see the broader security issues, so having the same leaders guiding the way, will not get them out of this predicament.

I have been discussing, talking, and analyzing the many recent cybersecurity issues with colleagues, and in one of my most recent posts, I asked if anyone was willing to reach out to Satya, perhaps the most powerful person in the world of digital technology. No takers.

So, I put pen to e-paper and have published an open letter to him to paint the picture on the problems and offer recommendations on how Microsoft can evolve to be a much better steward of trust for its products and as a foundation for our global electronic ecosystem.

For context, I have seen nearly identical issues in other large organizations and have written many articles on the failures of cybersecurity leadership. In fact, I have identified and wrestled an identical issue in one of the biggest tech firms in the US. It is addressable.

Let’s Raise Expectations!

But I believe it will take Satya Nadella to be aware and engaged.

It is time we raise our collective voices to the top. To the CEO himself, Satya Nadella, who at the end of the day is ultimately responsible. I think at this point it will take his direct intervention.

If you have a chance, take a read of the full letter to Mr. Nadella. If you like it, upvote, share, and comment. If you don’t feel free to add your thoughts on how Microsoft should tackle this persistent problem. Let’s get this in front of the CEO of Microsoft, so we all can be safer in our computing and have a trustworthy foundation for digital innovation, productivity, and success.

Read the Open Letter to Satya Nadella, to address Cybersecurity Leadership Issues - Posted to Help Net Security: https://www.helpnetsecurity.com/2024/07/09/microsoft-cybersecurity-dilemma/

The post Microsoft in Cybersecurity Leadership Crisis – Open Letter to the CEO appeared first on Security Boulevard.

]]>
2023796
50 CISOs & Cybersecurity Leaders Shaping the Future https://securityboulevard.com/2024/06/50-cisos-cybersecurity-leaders-shaping-the-future/ Tue, 04 Jun 2024 01:27:00 +0000 http://securityboulevard.com/?guid=820a5bb4532d02e9b84e86a170c1116e  

I am honored and humbled to be listed among such influential luminaries who collectively push our industry to continually adapt to make our digital ecosystem trustworthy!

An incredible list of cybersecurity CISOs and leaders cybersecurity CISOs and leaders that drive innovation for better value, foster industry awareness and collaboration, and optimize the protection of their organization!  

50 top CISOs and cybersecurity leaders to know

  • Dmitri Alperovitch is a cybersecurity thought leader, podcast host, and the bestselling author of World on the Brink. He is currently the Executive Chairman at Silverado Policy Accelerator, host of the Geopolitics Decanted podcast, and Board Member at Automax, Dragos, Inc., Cyber Safety Review Board, Homeland Security Advisory Council, National Security Institute - George Mason University - Antonin Scalia Law School, and The Cipher Brief. 
  • Darren Argyle FCIIS is currently the Group Chief Information Security Risk Officer at Standard Chartered Bank, and the former Group Chief Information Security Officer (CISO) at Qantas Airlines, Group CISO at IHS Markit, and has held various senior international cybersecurity leadership roles at Symantec and IBM. Argyle was awarded “Outstanding Cyber Security Professional” by the Cyber OSPAs, the CSO30 ASEAN Award, and “Innovator of the Year” by SANS Institute in 2022. 
  • Bret Arsenault is the Corporate Vice President and Chief Cybersecurity Advisor at Microsoft, where he’s spent nearly 35 years as an information security leader. In his current role, he acts as a key advisor to senior and security leadership teams across engineering, products, risk, and resiliency. 
  • Gerald Auger, PhD is the Chief Content Creator at Simply Cyber,  which boasts over 4 million views on YouTube. He is also an Adjunct Professor at The Citadel, Conference Director for Simply Cyber Con, Managing Partner at Coastal Information Security Group, and Advisory Board Member at Panoptcy Security. 
  • Jessica Barker, MBE, PhD, is a bestselling author, international keynote speaker, and cybersecurity thought leader. She is Co-founder and Co-CEO at Cygenta. 
  • Jerich Beason is a cybersecurity podcast host, keynote speaker, board advisor, and instructor who is currently serving as Chief Information Security Officer at WM.
  • Charlie Bell is Executive Vice President leading the Security, Compliance, Identity, and Management organization at Microsoft. He is a former Senior Vice President at Amazon Web Services, where he spent over 20 years growing the AWS business and leading general management of AWS services. 
  • Chuck Brooks is the President of Brooks Consulting International and an Adjunct Professor at Georgetown University. As a thought leader, author, and speaker, Brooks has spoken before the G20, US Embassy to the Holy See and Vatican, and USTRANSCOM as well as served on two National Academy of Science Advisory groups and an industry/government working group for CISA. Brooks has also received presidential appointments for executive service by two U.S. Presidents. 
  • Kip Boyle is a cybersecurity expert, host of the Your Cyber Path Podcast and Cyber Risk Management podcasts, and a course instructor at Udemy. As Fractional Chief Information Security Officer at Cyber Risk Opportunities LLC, Boyle provides cyber risk expertise to companies including the US Federal Reserve Bank, Boeing, Visa, Intuit, Mitsubishi, and DuPont. 
  • Naomi Buckwalter is an information security leader and the Founder and Executive Director of Cybersecurity Gatebreakers Foundation, which is committed to breaking down barriers of entry and solving the cybersecurity labor shortage. In addition, Buckwalter is also the Sr. Director of Product Security at Contrast Security. 
  • Bob Carver, CISM, CISSP, MS is a Principal Cybersecurity Threat Intelligence and Analytics at Verizon with over 25 years of experience in information security, specializing in threat hunting. He also serves on the Advisory Board of LexisNexis Fraud Defense Network and has served on the Advisory Board at Mastercard - Masters Collective. 
  • Dr. Magda Chelly is a published author, TEDx speaker, and globally recognized cybersecurity leader, recently recognized as a Microsoft Most Valuable Professional in Artificial Intelligence and Cloud Security. Chelly is the co-founder of RiskImmune, Chief Information Security Officer at Responsible Cyber Pte. Ltd., Advisory Board Member at Black Hat, and Sessional Lecturer, Cybersecurity at James Cook University. 
  • Anton Chuvakin is the Security Advisor at Office of the CISO, Google Cloud and the co-host of Cloud Security Podcast. Formerly a Research VP and Distinguished Analyst at Gartner for Technical Professionals, Security and Risk Management Strategies, he is also the author of Security Warrior, PCI Compliance, Logging and Log Management, and the securitywarrior.org blog as well as a contributor to the books Know Your Enemy II and Information Security Management Handbook. 
  • Graham Cluley is an award-winning cybersecurity speaker, writer, analyst, and host of the “Smashing Security” podcast, which has over nine million downloads. 
  • Steve Cobb is Chief Information Security Officer at SecurityScorecard. With decades of experience leading IT infrastructure, cybersecurity, incident response, and threat intelligence, Cobb was formerly Chief Information Security Officer at One Source Communications and a senior engineer at Microsoft and Verizon Enterprise Solutions. 
  • Edna Conway is a top information security voice, author, executive advisor, board director, and cloud technology executive. She is a Sr. Nonresident Fellow at Carnegie Endowment for International Peace, Advisor at Getz Executive Network, and a board member at Critical Start, Red Queen Dynamics, Inc., NightDragon, Interos Inc., Attabotics Inc., Active Cypher, Long Ridge Equity Partners, YL Ventures, DUST Identity, InfoSec Global, EMC Advisors, and SecurityScorecard. 
  • Sam Curry is Global VP and CISO in Residence at Scaler, as well as a Board Member at Cybersecurity Coalition and CyberTrust Massachusetts and a Fellow at the National Security Institute. With experience at RSA, Arbor Networks, McAfee, and Cybereason, he is also currently serving as an adjunct professor at Nichols College. 
  • Rik Ferguson is the VP of Security Intelligence at Forescout Technologies and the Co-Founder of Respect in Security. He is also a Fellow at the RSA, Special Advisor at Europol, and Advisory Board Member at Vaulter. 
  • Christophe Foulon, CISSP, GSLC, MSIT is a seasoned vCISO and cybersecurity leader, currently serving as Fractional CISO at Nexigen and Executive Cybersecurity Advisor at CPF Coaching. Foulon was formerly a Senior Cybersecurity Advisor at Capital One and Cybersecurity Adjunct Professor at Bellevue University. 
  • Jane Frankland is an award-winning author, speaker, coach, advisor, and cybersecurity influencer. She currently serves as an Advisory Board Member Executive Summit at Black Hat, Founder of The Source Platform (for Women in Cyber), Founder of IN Security Movement, StrategicAdvisor for e2e-assure, and Owner and CEO at KnewStart. 
  • Mari Galloway, MSIS, CISSP, is an Advisor at BestLink Strategies, LLC, bestselling author, and founding board member of the Women’s Society of Cyberjutsu.
  • Carlos Gonzalez is the Chief Information Officer at Epiq. Former President at CEG Tecnology LLC and VP/CIO of Information Services at Mt. Sinai South Nassau Hospital, he’s built secure and scalable operations for healthcare, legal, and financial companies. 
  • John Hammond is a cybersecurity researcher, educator, speaker, and content creator with over 1.5 million subscribers. He is currently part of the Threat Operations team at Huntress. 
  • Tia (Yatia) Hopkins is Chief Cyber Resilience Officer at eSentire, guest lecturer at The Wharton School, and Adjust Professor and Course Author - MS in Cybersecurity at Katz School at Yeshiva University. Hopkins is recognized as The Cyber Equalizer™, a global award-winning cyber exec, best-selling author, and keynote speaker. 
  • Troy Hunt is Founder and CEO of Have I Been Pwned, an organization that helps individuals assess their exposure in major data breaches. He is also an Information Security Author & Instructor at Pluralsight, Partner at Report URI, and Director at Superlative Enterprises, where he conducts professional speaking, training, and writing engagements. 
  • Diane M. Janosek, PhD, JD, CISSP, LPEC, is an award-winning cybersecurity leader, attorney, author, and speaker. Currently CEO at Janos LLC Practices and former member of the Defense Intelligence Senior Executive Service. Janosek also served as the National Security Agency’s Deputy Chief of Compliance. 
  • Zinet Kemal is a noted cloud security engineer, TedX Speaker, and author who’s been recognized as a Top 25 Cybersecurity Leader, Most Inspiring Woman in Cyber, and 40 Under 40. She is the founder of ZNET LLC and an experienced cloud security engineer for Fortune 500 companies. 
  • Brian Krebs is an investigative reporter focused on internet security and cybercrime. A former reporter for the Washington Post for 15 years, Krebs is also the author of Spam Nation: The Inside Story of Organized Cybercrime, from Global Epidemic to Your Front Door and a reporter and publisher at KrebsOnSecurity.com
  • Dan Lohrmann is a cybersecurity leader, advisor, mentor, blogger, and keynote speaker who has been named SC Magazine CSO of the Year, Governing Magazine Public Official of the Year, Computerworld Premier 100 Leader, and 2023 Top 30 People to Follow on Cyber. Lohrmann has advised leaders at the White House, National Governor’s Association, National Association of State CIOs, US Department of Homeland Security, and many other federal, state, and local government agencies as well as Fortune 500 companies. He is currently the Field Chief Information Security Officer leading public sector advisory at Presidio. 
  • Mark Lynd is a globally recognized thought leader, C-suite strategist, author, and keynote speaker on cybersecurity and AI. He is currently the Head of Executive Advisory & Corporate Strategy - CISSP, ISSAP &ISSMP at NETSYNC and has received several awards and recognitions for his leadership in cybersecurity. 
  • Mic Merritt is the Founder of Merritt Based, a cybersecurity firm specializing in Artificial Intelligence/Machine Learning systems and web/mobile application penetration testing. Merritt is also a Cybersecurity Instructor at Western Governors University
  • Daniel Miessler is the Founder of Unsupervised Learning and an Advisor at ProjectDiscovery, JupiterOne, and AKA Identity. Formerly the Head of Vulnerability Management at Robinhood, Miessler is an expert in AI and security infrastructure. 
  • Alyssa Miller is an author, international speaker, and experienced security executive. Formerly the Business Information Security Officer at S&P Global Ratings, Miller is currently CISO at Epiq Global and a member of the Technology Advisory Board at Epiphany Solution Group.
  • Charlie Miller is a Distinguished Security Engineer, Autonomous Vehicle Security at Cruise. A former hacker for the National Security Agency, Miller has previously worked as a consultant and as a Staff Security Engineer at Twitter. 
  • Angelique “Q” Napoleon is Cybersecurity Director, Division Deputy CISO & Cyber Capability Lead at General Dynamics Information Technology and a former Principle Cybersecurity Subject Matter Expert at the US Department of Defense.
  • Henrik Parkkinen is Information Security Officer at WirelessCar and a subject matter expert at ISACA. Parkkinen is recognized as a top cybersecurity voice and a 40 Under 40 in Cybersecurity. 
  • Chris Roberts is a cybersecurity strategist, researcher, and advisor who is currently Chief Strategist at Nuspire, CISO Advisory Board Member at Onyx Cyber, and Founding Board Member at Security Tinkerers. He also co-hosts the podcast WTF Did I Just Read
  • Matthew Rosenquist is a cybersecurity leader, speaker, and advisory board member with over 190k LinkedIn followers. He is currently CISO and Cybersecurity Strategist at Mercury Risk and Compliance, Inc., as well as a Board Member at The Futurum Group, Dominican University of California, United Cybersecurity Alliance, World Business Angels Investment Forum, Private Directors Association, and the University of Phoenix, College of Business and Information Technology, among others. He was formerly Cybersecurity Strategist for the Artificial Intelligence group and Cybersecurity Strategist and Evangelist at Intel.
  • Shira Rubinoff is a cybersecurity executive, advisor, keynote speaker, and author who serves on the Boards of Pace University Cybersecurity Program, The Executive Women’s Forum for Information Security, Leading Women in Technology, and others. Her verified YouTube channel has over 172k subscribers, and she has been named a Woman of Influence by CSO Magazine, the “One to Watch” award by CSO and the EWF, and the “Outstanding Woman in Infosec” by the CyberHub Summit. She is currently President - Cybersphere at The Futurum Group. 
  • Caitlin Sarian is the Founder and Executive Director at Cybersecurity Girl LLC and former Global Lead of Cybersecurity Advocacy and Culture at TikTok.
  • Rinki Sethi is VP and CISO at BILL and a Former VP & CISO at Twitter, with experience developing online security infrastructure for companies including IBM, PG&E, Walmart.com, eBay, Intuit Inc., and Palo Alto Networks. She has been recognized by CSO Magazine and SC Magazine as a top information security leader. 
  • Richard Stiennon is a research analyst and author of the Security Yearbook series. He is Chief Research Analyst at IT-Harvest and a Board Member at sāf.ai, Inc., Quick Heal, Anitian, and Phosphoroous Cybersecurity Inc. 
  • Dean Sysman is CEO/Co-founder at Axonius, a cybersecurity asset management system. As a leading cybersecurity expert, Sysman has spoken at major conferences including Black Hat, Defcon, CCC, and more. 
  • Eric Vanderburg is a noted cybersecurity author and consultant. He is currently Vice President, Cybersecurity at TCDI, where he leads the cybersecurity consulting division. 
  • Fabian Weber is a vCISO and Head of Compliance at PCG, where he lends his expertise to helping startups and SMBs achieve ISO 27001, SOC 2, and TISAX compliance. He is also CEO & Founder of WHYSEC and a Managing Partner at water IT Security & Defense. 
  • Tyler Cohen Wood, CISSP is a cybersecurity expert, author, and influencer who previously worked at the US Defense Intelligence Agency under the Department of Defense serving as Senior Intelligence Officer, Deputy Cyber Division Chief of the Special Communications Division. Tyler is currently co-founder of Dark Cryptonite and an on-air host at ITSPmagazine Podcasts. 
  • Burcu Yarar is Application Security Team Lead at VakifBank, Pentester/Bug Hunter at HackerOne, and Co-Founder at UNIQUESEC, a non-profit organization that brings together cybersecurity professionals in Turkey. 
  • Heide Young is ranked among the top 10 technology leaders in the Middle East. She is a Cybersecurity Woman of the World finalist 2023, cybersecurity strategist and author, and founding partner of Women in Cyber Security Middle East. 
  • Helen Yu is Founder & CEO at Tigon Advisory Corp and host of CXO Spice. She’s recognized as a Top 50 Women in Tech and an expert in AI and cybersecurity. She is also Co-Founder and Board Director of Dark Cryptonite, as well as a member of the Board of Directors at Communications Engineering Company (CEC), KEENFOLKS, and Vera Capital LP. 
  • Bob Fabien “BZ” Zinga, CISSP-ISSMP, PMP, MS, MBA is an award-winning cyber executive, CISO, advisor, author, and speaker, recognized as a C|CISO Hall of Fame 2023 Winner by EC-Council. He currently serves at the Information Warfare Commander (CDR/CEO/CISO/CIO/CTO, DoD TS/SCI) at the US Navy Reserve, as well as BCBR AAC Advisor & Co-Chair of The Communications and Technology Committee, Executive Board Advisor at United Cybersecurity Alliance, and Board Director at AZ Cyber Initiative.

The post 50 CISOs & Cybersecurity Leaders Shaping the Future appeared first on Security Boulevard.

]]>
2020460
The Rise and Risks of Shadow AI https://securityboulevard.com/2024/05/the-rise-and-risks-of-shadow-ai/ Fri, 24 May 2024 17:20:00 +0000 http://securityboulevard.com/?guid=23359af88eb6818cefbcd464e64355d4  

Shadow AI, the internal
use of AI tools and services without the enterprise oversight teams expressly
knowing about it (ex. IT, legal,
cybersecurity, compliance, and privacy teams, just to name a few), is becoming a problem!

Workers are flocking to use 3rd party AI services
(ex. websites like ChatGPT) but also there are often savvy technologists who
are importing models and building internal AI systems (it really is not that
difficult) without telling the enterprise ops teams. Both situations are
increasing and many organizations are blind to the risks.

According to a recent Cyberhaven
report
:

  • AI is Accelerating:  Corporate data
    input into AI tools surged by 485%
  • Increased Data Risks:  Sensitive data
    submission jumped 156%, led by customer support data
  • Threats are Hidden:  Majority of AI use
    on personal accounts lacks enterprise safeguards
  • Security Vulnerabilities:  Increased
    risk of data breaches and exposure through AI tool use.


The risks are real and
the problem is growing.

Now is the time to get ahead of this problem.
1. Establish policies for use and
development/deployment

2. Define and communicate an AI Ethics posture
3. Incorporate cybersecurity/privacy/compliance
teams early into such programs

4. Drive awareness and compliance by including
these AI topics in the employee/vendor training


Overall, the goal is to build awareness and
collaboration. Leveraging AI can bring tremendous benefits, but should be done
in a controlled way that aligns with enterprise oversight requirements.


"Do what is great, while it is small" -
A little effort now can help avoid serious mishaps in the future!

The post The Rise and Risks of Shadow AI appeared first on Security Boulevard.

]]>
2019630
Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses! https://securityboulevard.com/2024/05/unlock-your-cybersecurity-career-exclusive-discounts-on-top-training-courses/ Wed, 15 May 2024 00:22:00 +0000 http://securityboulevard.com/?guid=3fdd7d729906ef54665e2f453485f1c2  

There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers.  Training plays an important part.  That is why I am partnering with Infosec4TC, an online training provider that offers free courses in addition to affordable classes, to offer huge discounts on cybersecurity training (links below have embedded discount codes). 

I have negotiated with the great team at Infosec4TC to reduce the price on select courses by up to 65% off!  Many courses include working on real cybersecurity projects, realistic assignments, and prep-work for certifications.  They have an impressive TrustPilot score and a 14 Day Money Back Guarantee full refund policy!

Check out these featured classes:

9e619400e5fefc5af21d373fc8f7f4aaf3de2de8dda7669c9bc3c78e68b83611.png

Cyber Security Specialist Live Workshop – a total of 64 hours of instruction that cover the breadth of issues for operational specialists.  Check out the course curriculum for details.

af65f812960ac262dec0df0d7a8c92ff0b11ce9516563e622d0c8b5491c71aeb.png

SOC Analyst (Blue Team) Live Workshop – a live, hands-on course designed for front-line tier-1 Security Operations Center analysts.  It teaches tools, analysis, event management, threat hunting, and incident response principles.

 

240c35758c4e1ef32a9bdafbd311845d9009c63f0537930c6ecb4ee83522bf41.png

ISO/IEC 27001:2022 Lead Implementer Live Workshop – an interactive session that covers the standards, methods, and best practices for Information Security Management Systems (ISO 27001) for managers and supervisors.

 

Also available is the Gold Membership Access membership that grants access to over 175 training courses, labs, materials, practice exams, and exam simulators.  Check out the details.

 

Be sure to look at the free classes as well!

f7bb41d442426f32d13126050012bd95795e1bcbe58abb0a66771b3baae5636c.png

Drop me a note if you take one of these courses.  Let me know your thoughts and if I should continue to work with them to offer big discounts!

The post Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses! appeared first on Security Boulevard.

]]>
2017866
Unlocking SMB Cybersecurity: The Rise of Virtual CISOs in 2024 and Beyond https://securityboulevard.com/2024/05/unlocking-smb-cybersecurity-the-rise-of-virtual-cisos-in-2024-and-beyond/ Fri, 03 May 2024 18:49:00 +0000 http://securityboulevard.com/?guid=bc7acb0bbe689f32516214bcca4b5939  

This year, virtual CISOs must begin making a difference in our industry.  For the longest time, small and medium businesses (SMBs) have been abandoned by the cybersecurity industry.  But, SMBs need security leaders to guide them through the maze of cyber risk and craft practical strategies that align with their unique ever-evolving business objectives.

Sadly, SMBs cannot afford an experienced full-time CISO.  They often either ignore the risks or get lured into purchasing shiny tools that do not meet their overall needs.  Before spending money on security solutions, it's crucial to understand the risks and develop clear objectives that support the overall business goals.

This is the role of a CISO: to set the direction and establish cybersecurity program foundations that will meet the expectations of the Board and C-suite.

However, there are not enough CISOs to go around which creates a high premium on their time.  Hiring a CISO can cost hundreds of thousands of dollars, which is far beyond what most SMBs are willing to commit.  But they don’t actually need a full-time CISO.  An hour or two may be perfect for guidance, leadership, and strategy development.  This is where the fractional/virtual CISOs (vCISO) community can play a role!

Experienced CISOs often have a few hours extra per week and yearn to take on new challenges, as long as it does not impact their day job.  Many retiring CISOs still have the itch to contribute, but don’t want to commit the long hours of managing all the operations and details.  They would rather leverage their experience to provide guidance and help organizations avoid costly pitfalls.

It becomes a perfect fit.

Experienced leaders offer guidance at a fraction of the cost, with short-term contracts keeping commitments flexible. Everyone wins.

vCISOs can provide leadership without being tied to the demanding operational aspects.  By dedicating a few hours a week, vCISOs help SMBs benefit from experienced cyber risk leadership with direction, focus, and an understanding of the evolving risks.  SMBs can then make informed business decisions that properly account for cybersecurity factors.  The practical benefits include effective prioritization and efficient allocation of resources for an optimized cybersecurity posture, based upon their unique needs.

There are risks in the vCISO market.  Two things to watch out for:

First, beware of vCISO services offered by security vendors masquerading as impartial advisors.  In many cases, this is just a ploy to get customers to buy the parent company’s products or services.  These people are effectively used as a sales channel and incentivized to convince SMBs to purchase their wares.  They aren’t necessarily looking out for their clients’ best interests.  Instead, seek out vendor-agnostic vCISOs that will work with what you have and align recommendations to your actual needs.

Second, many will assert themselves as seasoned cybersecurity leaders, but in actuality, lack the practical experience needed to be a successful vCISO.  Let’s be clear, a vCISO is NOT an entry-level job.  Rather it is the opposite.

An experienced cybersecurity leader can quickly understand the major risks and business needs, develop a customized set of strategic plans for a specific organization, and communicate effectively to executives so they may rapidly understand and make well-informed decisions.  vCISOs must be vetted properly to make sure they can deliver quality results in very limited timeframes.  Otherwise, it will be money wasted!

If you are interested in exploring how vCISOs can help businesses, sectors, or various audiences, reach out to me directly or visit my website.  We must purposefully work to support the SMB community.  Let's join forces to make this year a turning point in fortifying SMBs and bolstering their digital security and competitiveness!

The post Unlocking SMB Cybersecurity: The Rise of Virtual CISOs in 2024 and Beyond appeared first on Security Boulevard.

]]>
2016965