Influencers
Justin Silbert, GCIH, GCFE, CISSP CISO of Walter Reed National Military Medical Center,
Lowering risk by putting response before incident
As individuals, some people are good at improvisation, that is, dealing with things as they come and creating the best outcome for it. But, organizations in the midst of an incident are notoriously terrible at improvising. There is no better example than Equifax, whose initial response was fraught with missteps.
The complete article is here
C. G. J. Putman, Abhishta, Lambert J. M. Nieuwenhuis University of Twente, Enschede, The Netherlands
Business Model of a Botnet
Botnets and malware over the last couple of years have proven to be a serious threat to cybersecurity. A botnet is a network of various computers which can be controlled by attackers. The controller of the network is called the botmaster. It gives commands to the network by making use of various communication channels.
The complete article is here
Rob Beason, CISSP, GSLC, Security + Volunteer work.
Radical idea in ics cybersecurity?
Many of the ideas in this article are shared by other thought leaders in the industry. The main theme from the article is that due to the inherent flawed design of the Internet, there will be a resulting lack of assurance for industrial control systems connected to it.
The complete article is here
John Dickson Vice President, IT Infrastructure & Cybersecurity at Republic National Distributing Company
Overcoming a False Sense of Security
The internet of things( IoT) revolution is helping manufacturers and distributors around the globe work smarter and achieve better outcomes than ever before. Companies now gather data from sensors, video cameras and other devices.
The complete article is here
Mary Beth Marchione
The Marketplace Calls on Entities to Demonstrate Cyber Risk Management
In today’ s day and age, most companies are faced with the“ when,” not“ if” reality of a data breach occurring within their organization. As a response, the AICPA has recently created a framework designed to help businesses demonstrate they have effective risk management practices in place as it relates to cybersecurity –“ System and Organization Controls( SOC) for Cybersecurity.”
The complete article is here
Gaylynn
Fassler, MS