This Month in Cyber Security – 4.24.2018

For the last 26 months consecutively, we have provided 30-min overviews of security “stories” on the last Tuesday of the month.  Today’s webinar was no exception.  Here are some of the highlights shared from “This Month in Cyber Security – April 24, 2018” which is also recorded (video 26:07).  For a little fun, we provided this in quiz format!

  1. The NIST Cyber Security Framework graphic is important because it:

a. Reminds us that security exercises begin with IDENTIFY-ing data and value thereof.

b. Illustrates DETECT-ion as central to your security strategy and a bridge to reacting.

c. Demonstrates equal value of Reaction to Prevention…a common oversight in organizational security strategies.

d. All of the above

2. The reason for the oversized pointer to the Identity piece of the Peters & Associates security wheel is because:

a. Identity plays a critical role through all layers of security controls.

b. The arrow was an oversight and missed by our editing group.

c. The whole thing is simply a maze in disguise and we needed a “Start Here” arrow.

d. None of the above

3. We introduced the idea of the Identity Perimeter pictured below to:

a. Prove that castles really are an effective housing option for modern datacenters.

b. Protect against modern threats such as Phishing/Credential theft, SaaS applications and BYOD devices not currently protected by network perimeters.

c. Confuse all attendees

d. All of the above

During this discussion, we described in detail stories from the field where customers were seeing the following violations in their environment:

Scenario:  Actively compromised mailboxes with logins often from foreign countries.  The intruder is monitoring emails for discussions of financial matters and intercepting / replying as the owner with falsified bank routing details.  Furthermore, they are protecting notifications with mailboxes rules intercepting warnings saying “phishing, hacked or other common terms”.

4. We talked about a turnkey offer we leverage using Microsoft identity controls that:

a. Evaluates the current security posture of your O365 for 40+ mis-configurations

b. Jump-starts use of Multi-factor Authentication (MFA) to 10 users with a combination of Conditional Access, Identity Protection, and others along with solid experience

c. Overviews a systematic process to keep checking many of the 40+ misconfigurations to maintain a solid security posture and “detect” breaches

d. All of the above

If you need a 2 minute overview of what we’re doing – check out this video.  For the answer key to above (or if you prefer to just get started) give me a shout or hit info@peters.com  and we’ll set up a time to talk it through.

By |2018-12-18T12:06:33-05:00April 25th, 2018|Security Solutions|Comments Off on This Month in Cyber Security – 4.24.2018

About the Author:

Bruce is the Vice President of Business Strategy. In addition to client-facing roles, Bruce is responsible for operational excellence in areas such as marketing, product alignment, and vendor relations. Over the past 25 years, Bruce has always served in an advisory role for C-level executives, IT Directors and CISOs to ensure that business goals align with IT strategies and initiatives. Microsoft has recognized, trained and badged Bruce as an internal Microsoft resource to allow him full access to solution architecture, roadmaps and competitive guidance. Bruce has a focus on consultative education and helping organizations envision their future with justifiable rationale. He is sought after on speaking engagements including CIO roundtables, executive forums, and conferences. Bruce is a graduate from the University of Illinois (Secondary Ed.) and also holds an MBA from Keller Graduate School, with a credentialed security focus (CISM).