Back in October of 2023, I was invited as a guest speaker at the ISC2 Global Security Congress in Nashville, Tennessee. However, that plan was thwarted at the last minute by American Airlines whom decided that an 18 hour layover in New York was just fine, and there were no other options to get there [...]
Blog
Episode 08 – Protecting Critical Infrastructure: A Guide to Operational Technology Security in Modern Environments. – With Andrew Ginter
Andrew Ginter Andrew Ginter is renowned for his expertise in control systems and industrial cybersecurity. With a foundation laid at Hewlett Packard, he pioneered high-end control system products for the worlds largest pipelines and power grids. Transitioning into IT-OT middleware, Andrew established connections between control systems and business automation, revealing the cybersecurity implications that would [...]
AI regulation around the world
How are countries addressing AI regulation around the world? As the adoption of AI by both businesses and individuals grows increasingly widespread across the globe, governmental bodies are actively working to determine the appropriate regulations that need to be instituted. The people over at Lewis Silken, have created this detailed world map on what regulations [...]
ChatGPT for threat actors
The Rise of Large Language Models Large language models have revolutionized various industries, from healthcare to finance, by providing advanced natural language processing capabilities. They are capable of understanding, generating, and interpreting human-like text, making them valuable assets in numerous applications. Another industry that they are also revolutionizing is that of cybercrime. Since the launch [...]
Episode 07 – LLM Governance, Security Policies, and Enterprise Integration – With Tim Patterson
Tim Patterson As the VP of Cloud at NorthBay Solutions, Tim Patterson's personal mission is to drive innovation and transformation in the cloud industry by leveraging cutting-edge technologies and industry best practices to help organizations achieve their digital transformation goals. He is committed to delivering exceptional customer service, building strong partnerships, and providing thought leadership [...]
Episode 06 – Exploring the Impact of ChatGPT and LLMs in the Cybersecurity Industry – With Lucas Black
Lucas Black Lucas Black is a Principle Security Solutions Architect, with 68 certifications and licenses including CISSP, COSP, and CSOCP to name a few. A distinguished IT professional, beginning his journey in 1994. Currently working with value-added reseller, CDW, Lucas continues to create secure, efficient IT ecosystems, all the while strengthening his reputation as an [...]
Key Findings and Recommended Risk Mitigations from The Verizon 2023 Data Breach Investigations Report
What is the Verizon DBIR? The Verizon Data Breach Investigations Report (DBIR) is an annual report that analyzes and presents data on cybersecurity incidents and data breaches. It is widely respected and closely followed in the cybersecurity industry due to its comprehensive and data-driven approach. The DBIR leverages data contributed by dozens of global organizations [...]
Episode 05 – Preparing for Cyber Threats: The Power of Crisis Exercises – With Lester Chng
Lester Chng is a cybersecurity and crisis management professional and he has extensive experience in conducting exercises and establishing large-scale exercise programs in the financial services sector as well as the military. He has participated as the lead representative in multinational security exercises and has also orchestrated enterprise-wide live exercises. Lester is a former Naval [...]
I wrote a cybersecurity article every day for 30 days – Here is what I learned.
[Post 31 of 30] In this recap post, I am going to lay things bare. Some thing worked well and some things fell flat. And I mean completely bombed. The goal of this post is to show the insights I gained from this experience, and hopefully others can get some benefit from walking through the [...]
Unlocking Your Cybersecurity Budget: A Detailed Guide to Leveraging CVSS, EPSS, and CISA KEV
[Post 30 - 30 in 30] Effective cybersecurity management involves leveraging a variety of tools and resources. Three such tools, CVSS (Common Vulnerability Scoring System), EPSS (Exploit Prediction Scoring System), and CISA KEV (Known Exploited Vulnerabilities), are critical for identifying, assessing, and mitigating potential threats. Harnessing CVSS, EPSS, and CISA KEV The first tool, CVSS, [...]