Blog

Episode 08 – Protecting Critical Infrastructure: A Guide to Operational Technology Security in Modern Environments. – With Andrew Ginter

Andrew Ginter Andrew Ginter is renowned for his expertise in control systems and industrial cybersecurity. With a foundation laid at Hewlett Packard, he pioneered high-end control system products for the worlds largest pipelines and power grids. Transitioning into IT-OT middleware, Andrew established connections between control systems and business automation, revealing the cybersecurity implications that would [...]

AI regulation around the world

How are countries addressing AI regulation around the world? As the adoption of AI by both businesses and individuals grows increasingly widespread across the globe, governmental bodies are actively working to determine the appropriate regulations that need to be instituted. The people over at Lewis Silken, have created this detailed world map on what regulations [...]

ChatGPT for threat actors

The Rise of Large Language Models Large language models have revolutionized various industries, from healthcare to finance, by providing advanced natural language processing capabilities. They are capable of understanding, generating, and interpreting human-like text, making them valuable assets in numerous applications. Another industry that they are also revolutionizing is that of cybercrime. Since the launch [...]

Episode 07 – LLM Governance, Security Policies, and Enterprise Integration – With Tim Patterson

Tim Patterson As the VP of Cloud at NorthBay Solutions, Tim Patterson's personal mission is to drive innovation and transformation in the cloud industry by leveraging cutting-edge technologies and industry best practices to help organizations achieve their digital transformation goals. He is committed to delivering exceptional customer service, building strong partnerships, and providing thought leadership [...]

Episode 06 – Exploring the Impact of ChatGPT and LLMs in the Cybersecurity Industry – With Lucas Black

Lucas Black Lucas Black is a Principle Security Solutions Architect, with 68 certifications and licenses including CISSP, COSP, and CSOCP to name a few. A distinguished IT professional, beginning his journey in 1994. Currently working with value-added reseller, CDW, Lucas continues to create secure, efficient IT ecosystems, all the while strengthening his reputation as an [...]

Key Findings and Recommended Risk Mitigations from The Verizon 2023 Data Breach Investigations Report

What is the Verizon DBIR? The Verizon Data Breach Investigations Report (DBIR) is an annual report that analyzes and presents data on cybersecurity incidents and data breaches. It is widely respected and closely followed in the cybersecurity industry due to its comprehensive and data-driven approach. The DBIR leverages data contributed by dozens of global organizations [...]

Episode 05 – Preparing for Cyber Threats: The Power of Crisis Exercises – With Lester Chng

Lester Chng is a cybersecurity and crisis management professional and he has extensive experience in conducting exercises and establishing large-scale exercise programs in the financial services sector as well as the military. He has participated as the lead representative in multinational security exercises and has also orchestrated enterprise-wide live exercises. Lester is a former Naval [...]

Unlocking Your Cybersecurity Budget: A Detailed Guide to Leveraging CVSS, EPSS, and CISA KEV

[Post 30 - 30 in 30] Effective cybersecurity management involves leveraging a variety of tools and resources. Three such tools, CVSS (Common Vulnerability Scoring System), EPSS (Exploit Prediction Scoring System), and CISA KEV (Known Exploited Vulnerabilities), are critical for identifying, assessing, and mitigating potential threats. Harnessing CVSS, EPSS, and CISA KEV The first tool, CVSS, [...]