Cybersecurity Sense

Informações:

Synopsis

CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAMP, FISMA Compliance, HIPAA Compliance, HITRUST CSF Certifications, NIST 800-171 Certifications, PCI Data Security Standards, SOC Reporting and SOX Compliance.

Episodes

  • Risks Rising for Email Data Breaches

    14/09/2017 Duration: 10min

    Sadly, email data breaches continue to be an increasing problem for businesses and organizations who retain large amounts of sensitive client and customer data. In fact, more than 700 million email accounts and millions of associated passwords were recently leaked in the biggest spambot dump ever. Breaches of this scale and impact have happened to Dropbox, LinkedIn, and Adobe in the past few years. So, what is the risk to your organization? In this podcast, LBMC Information Security’s Bill Dean discusses the numerous ways these data breaches are also a risk to your organization. Take a listen, and discover these key takeaways: Information about one of the largest email data breaches that just hit the Internet Potential risks to your organization Obvious personal risks that you should address for yourself, your family, and your friends

  • The Risks of Remote Access

    28/08/2017 Duration: 09min

    Remote access to networks has become commonplace in today’s IT environments, as this access is mainly used for IT support, power users, and developers. While this capability can be provided in a safe and secure manner, it can also be deployed in a manner that leaves the organization at great risk. When Remote Desktop is enabled, attackers can brute force administrator credentials, because you can’t lock out the administrator account due to excessive failed logins. With this access, an organization’s entire network could be at risk of compromise and data theft. In this podcast, LBMC Information Security’s Bill Dean discusses the direct risks associated with remote access to Windows servers. Here’s what is covered within the podcast: Security risks involved with remote access to networks Recent statistics associated with Remote Desktop attacks LBMC Information Security’s experience with remote access attacks Ways to protect your organization from remote access attacks  

  • Attacker Dwell Time

    22/08/2017 Duration: 08min

    Especially for healthcare IT systems, cyber attacks can lead to the exposure of patient data, service disruptions, time-consuming recovery processes, and high costs in the form of paying a ransom or spending money on new servers, security systems, or consultants. However, that is only when an organization is aware of the breach. Some network breaches can go on for months or even years before an organization learns about it, and these can even be organizations that take information security very seriously with compliance requirements, appropriate budgets, and talented security personnel. The time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim “dwell time” or the “breach detection gap.” In this podcast, LBMC Information Security’s Bill Dean discusses attacker dwell time and some methods that can be implemented to address it.  Listen in, and learn about these key takeaways: Advanced attacks will often circumvent traditional static protections. This

  • Combating Insider Threats

    08/08/2017 Duration: 09min

    It’s true—insider threat events are typically much less frequent than external attacks. However, insider threats often pose a much higher severity of risk for organizations when they do happen. As insiders are given access to sensitive information for work purposes, there’s a great potential for them to do a tremendous amount of damage to a business if they accidentally break policy or choose to steal. Even more, it has been reported that nearly a third of all organizations still have no capability to prevent or deter an insider incident or attack.   In this podcast, LBMC Information Security’s Bill Dean addresses insider threats, while offering suggestions on how to combat them with digital forensics.   Here’s what is covered in the podcast:   Limiting the access to sensitive information to a “need to know” basis Understanding the value of digital forensics and knowing when to use it Being cautious about handling the analysis internally due to expertise

  • Business Email Compromise: When The Threat is Internal

    08/08/2017 Duration: 12min

    Since January of 2015, all 50 of the United States have reported an increase in business email compromise (BEC) attacks—a 1,300 percent increase, to be exact. Even worse, organizations have reported a loss of nearly one billion dollars. With everyone now being a potential target, it’s been noted that reconnaissance, social media, and social engineering has played a crucial role, as cyber thieves monitor and learn an organization’s “system.”   In this podcast, LBMC Information Security’s Bill Dean addresses BEC attacks and offers a few solutions for how to combat business email attackers.   Listen in and you’ll learn about:   BEC in the news (modern-day Nigerian money scams) Defining BEC The impact of BEC A brief overview of BEC Protections against BEC

  • How To Create SIEM ROI

    01/08/2017 Duration: 16min

    SIEM, or security information & event management, is becoming a fairly common security control these days. It focuses on aggregation and analysis of log data. For this podcast we will assume you have a basic understanding of SIEM and how it’s commonly deployed. If you don’t have that base-level of understanding, you might want to check out one of our other podcasts that focuses on SIEM fundamentals.   We’re going to focus on 3 key value points that any SIEM implementation should provide. The reason for breaking these down for you is that we see far too many organizations that aren’t realizing the full value of their SIEM. 1- Worst Case Scenario Protection 2- Audit & Reporting 3- Research & Troubleshooting   No matter if you are using a managed service provider for SIEM or running your own platform in-house, you need to make sure you are getting at least these 3 key value points from the solution. The ability to articulate this value to your operational and leadership teams is going to go a long wa

  • The Value of Incident Response Table Top Exercises

    26/07/2017 Duration: 09min

    Are you prepared for a ransomware attack? Bill Dean, Senior Manager, LBMC Information Security, discusses a low-cost approach method to determine how well you will respond to computer cybersecurity incidents, similar to those that you are reading about in the news, by performing incident response tabletop exercises. 

page 4 from 4