Remove Accountability Remove CISO Remove Workshop
article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

One program, for instance, puts on workshops for Congressional staffers and other federal employees on how to recognize and avoid nation-state backed hackers looking to interfere in elections. So we’ve boiled the NIST framework down into a very focused workshop exercise. LW: How did this organization get started?

Internet 160
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The discomfort zone

Notice Bored

I feel more confident about the underlying generic principles of risk, compliance, conformity, obligations, accountabilities, assurance and controls though, and have the breadth of work and life experience to appreciate the next point. The possibility of being held personally to account (perhaps even sacked or prosecuted!)

Risk 72
article thumbnail

Banks, Arbitrary Password Restrictions and Why They Don't Matter

Troy Hunt

But it's not necessarily that bad, and here's why: Password Limits on Banks Don't Matter That very first tweet touched on the first reason why it doesn't matter: banks aggressively lock out accounts being brute forced. However, after 3 attempts of entering an Access Code your account will be blocked. Any thoughts?

Banking 234
article thumbnail

Cisco Secure Endpoint Shines in the 2020 MITRE® Engenuity ATT&CK Evaluation

Cisco Security

This action accounted for over 38% of the contributions to our findings during the evaluation. Cisco Secure Endpoint and MITRE ATT&CK: Why it matters to CISOs right now. Orbital Advanced Search. Another recent addition, Orbital Advanced Search , was a key contributor to the evaluation results as well.

article thumbnail

Cisco Secure Endpoint Shines in the 2022 MITRE® Engenuity ATT&CK Evaluation

Cisco Security

In 2017, Sandworm infiltrated Ukrainian accounting software MeDoc and hijacked the company’s update mechanism which resulted in malicious software being introduced to copies of the MeDoc software used by its customers. Cisco Secure Endpoint and MITRE ATT&CK: Why it matters to CISOs right now. Scenario 2: Sandworm. Protection Test.

Software 116
article thumbnail

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

Cisco Security

My good friend and fellow Advisory CISO Helen Patton has done a great summary of the memo in a previous blog. Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch attacks.” Sign up for a Cisco Zero Trust Workshop today!