Breweries – Can they be Hacked?
by Peter Fellini on January 15, 2020 at 2:27 PM
100 bottles of beer on the wall, 100 bottles of beer! Has anyone thought about what goes into making beer? I recently received my “Professional Craft Brewing” certification from Johnson & Wales. Throughout the program we went out and worked in commercial breweries.
Top 5 vCISO Takeaways of 2019
by Derek Boczenowski on January 8, 2020 at 1:00 PM
As the end of the year rapidly approaches, everyone does their best to reflect upon the prior year (or decade, since it is the end of one of those as well) and see what they might have learned from the past year. What were the top songs, top movies, and top vacation destinations, just …
3 Keys to Getting Your Cybersecurity Program Back on Track
by Patrick Hughes on January 2, 2020 at 1:39 PM
2020 is finally here, whether we are ready for it or not! With the new year brings new challenges to organizations across all industries. With technologies on the rise and criminals only gaining more and more resources, organizations may struggle to keep up in 2020.
Nest Cameras – Basic Defense In Depth
by George Seerden on December 26, 2019 at 1:00 PM
I’m sure many of you have seen or heard of the recently released viral video showing a young girl being yelled at in her room via her internet connected Nest camera. Obviously, this was on a home network, but it occurred to me that a large amount of commercial entities also have inter …
The FFIEC Gives the BCP Booklet a Facelift
by Jerry Hughes on December 19, 2019 at 1:00 PM
From BCP to BCM The Federal Financial Institutions Examination Council (FFIEC) Information Technology Examination Handbook (IT Handbook) is comprised of several IT booklets for use by examiners. In November of 2019, the FFIEC member agencies replaced the dated “Business Continuity Pla …
Virtual CISO: What’s the Benefit?
by Nicholas Foisy on December 13, 2019 at 3:30 PM
The Chief Information Security Officer (CISO) is a vital role within most organizations. Tasked with establishing and maintaining the organizational vision, strategy, and program to ensure information technology assets are adequately protected, this individual is often your primary de …