Friday, March 23, 2018

Today's comment

It's not the load that breaks you down, it's the way you carry it.

23Mar2018

information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/?amp=1

Wednesday, January 17, 2018

Monday, July 24, 2017

Main causes of data losses

                                                                    








Thursday, June 1, 2017

Target lesson learned why Small business need cyber insurance

http://news.softpedia.com/news/target-to-pay-18-5-million-to-47-states-for-2013-data-breach-516007.shtml

It has always been my opinion  that all business need to plan for unforseen issues via insurance. Just as consumers have car, home and etc.... This TARGET settlement highlights the need for or at the very least demonstrates the liability that business incur when operating in cyber space. Target can absorb this but i imagine my account or cleaners that operate via the WWW as a critical business component and what would be their recourse in a similar instance. Despite recent regulation for POS and health there is no over arching regulation for PII (personable identity information) and small business best business practices. This leaves a considerable gap for the small business that operates in cyber space. As a tangent is there a need for retailers to warn  buyers of vulnerabilities in IOT?

Friday, April 28, 2017

Monday, April 24, 2017

http://www.darkreading.com/operations/CISO board-members-have-widely-divergent-views-on-cybersecurity/d/d-id/1328674

CISOs, Board Members Have Widely Divergent Views on Cybersecurity

Boards often want a lot more business-relevant reporting than CISOs provide, Focal Point Data Risk study shows.
For all the talk about cybersecurity needing to be a board-level issue, security executives and corporate directors continue to have very different views on just about every critical aspect of the security function.
Research released this week by Focal Point Data Risk shows that CISOs and board members often have different perspectives on the value of cybersecurity, on how to assess the effectiveness of security programs, and how to measure and express risk.
While C-suite members for example often viewed data and brand protection as the primary value of cybersecurity to the organization, CISOs somewhat surprisingly viewed their primary functions as guiding and enabling the business and in ensuring loss avoidance.
For the report, Focal Point conducted one-on-one interviews with more than 50 CISOs, 25 corporate directors and 10 subject matter experts. The goal was to try and identify how corporate directors and CISOs viewed each other’s roles and responsibilities on the cybersecurity front. Interview questions were open-ended and were conducted by Cyentia Institute, which also wrote the report.
One of the key discoveries was that CISOs—at least those interviewed for the report—generally tended to view the security function as having less to do with data and brand protection than board members.
A lot of that, according to the report, may simply have to do with CISOs trying to position cybersecurity as a business enabler rather than a cost center in meetings with board members. While security executives know that protecting data is one of their primary functions, many feel pressured to demonstrate how that helps the bottom line, the report noted.
Board members and CISOs also had substantially divergent views on the effectiveness of their organization’s security program. While 46% of security executives in the Focal Point study expressed confidence in their security controls, only 5% of board members shared that sentiment. Conversely, 49% of board members expressed a lack of confidence in their organizational security controls compared to 13% of security executives who felt the same way.
“CISOs have a challenging time proving a negative, that if they didn’t exist [it] would result in a material weakness and bad outcome,” says Yong-Gon Chon, CEO of Focal Point Data Risk. The board’s lack of confidence also stems from the continuing habit by security executives to present cyber jargon to board instead of business language, Yong-Gon Chon said. Meetings with security executives often leave board members with the impression that no matter how much they spend, they will still get breached.
Similarly, the metrics that CISOs use to convey the status of the organization’s security program to the board tend to be more operational in nature while board members are far more interested in big picture metrics such as peer benchmarking.
One surprising finding from the report is the relatively low desire among board members to see risk expressed in terms of financial losses over a specific time frame.
“I hear it said a lot that the ‘language of the board is dollars,’ and assumed that meant they’d want to hear cyber risk discussed in those same terms,” says Wade Baker, co-founder of Cyentia Institute. “But I think there’s a lot of skepticism on the ability to accurately measure cyber risk, and so they prefer a clear explanation of where things stand.”
John Pescatore, director of emerging security trends at the SANS Institute says much of the disconnect stems from a failure by CISOs to communicate. “CISOs [are] very good at presenting ‘blood in the streets’ and very bad at presenting strategy on how to avoid it,” Pescatore says. Many are weak at using trend data to give the board confidence that the business could avoid or minimize the risks facing them.
CISOs have to learn to show the connection between security expenditures and business impact. “That doesn’t always mean ROI, but it does mean more than ‘bad things are happening. If we don’t get more people or spend more money, it will happen to us,’” he said.
Framing things in terms of risk and business enablement can help enable a better conversation with the board, adds Christopher Pierson, general counsel and chief security officer at online payment service Viewpost.
“Showing the board a bunch of flowcharts, diagrams, and numbers on how much malware was blocked does not answer or address their fundamental question,” Pierson says. What the board wants to know is how the security organization is mitigating risk and what its directors can do to help.
“A [board member] favors metrics combined with an intuitive story. But it has to be a narrative they can understand,” says Daniel Kennedy, an analyst with 451 Research. “The somewhat difficult, technical problem of security needs to be described in layman terms that go just deep enough for very intelligent people, who happen not to be security experts [to understand],” Kennedy says.


Wednesday, April 5, 2017

Tuesday, January 17, 2017

War-for-cybersecurity-talent-hits- DC


courtesy: www.cio.com 
Many analysts and business leaders believe there is a severe need for qualified cybersecurity professionals in the U.S., something that has caught the eye of at least one key congressman.
U.S. House Homeland Security Committee Chairman Michael McCaul (R-Texas) on Wednesday said more needs to be done to address the cybersecurity labor shortage.
"I agree 110% that we need to strengthen the workforce" of cybersecurity professionals, McCaul said during a meeting with reporters at the National Press Club.
McCaul was referring not only to cybersecurity workers needed for U.S. government agencies, but also for U.S. businesses that control the nation's critical infrastructure, including the electric grid and electronic healthcare records. "Eighty percent of the malicious codes are in the private sector," he said.
The need to fill cybersecurity jobs has been top of mind recently because of cyber exploits like the two massive Yahoo breaches announced late last year. Also, intelligence community revelations that Russia tried to influence the U.S. elections with various cyber-exploits have galvanized some U.S. lawmakers, including McCaul.
Several experts have estimated the workforce shortage of cybersecurity workers in the U.S. -- across multiple job titles -- currently at 300,000 or more. The most recently available analysis, from the U.S. Bureau of Labor Statistics, said the shortage of such workers in 2015 reached 209,000. Globally, the shortfall of cybersecurity professionals is expected to reach 1.5 million by 2020, according to data published by the National Institute of Standards and Technology.
DealPosts
Despite such dire projections, there is at least one contrary point of view. A DHS official said in a blog post in November that the cybersecurity skills shortage is a myth.
For his part, McCaul plans to push for a cybersecurity agency within the Department of Homeland Security, partly to provide cyber assistance for national elections that are under state management. "DHS needs focus and resources," he said.
To fill cybersecurity job openings, U.S. companies have developed a number of strategies over recent years.
Major corporations such as AT&T have established in-house re-training of IT workers to become cybersecurity professionals. Also, AT&T has set up a rotational program so that a recent graduate can rotate through various departments at the company to become a well-rounded security expert.
"The labor shortage is a huge problem. Nobody can get enough resources," said Jason Porter, vice president of security solutions at AT&T, in an interview. "We're excited to see a bunch of colleges have launched new programs around cybersecurity, so we'll see more cyber talent. But companies are still way behind. Right now, cybersecurity is paramount. We are actively retraining our own employee base."
Over the entire company, AT&T currently has more than 2,000 cybersecurity professionals, he said. The company operates eight security operations centers globally and offers cybersecurity services to thousands of companies.
While AT&T and other major companies are trying to adjust, the security challenges are greatest for small and mid-sized companies, analysts said.
"Small and mid-sized businesses are suffering the most," said IDC analyst Sean Pike. "They don't have the money to pay for talent and not even for managed services. They are sometimes hiring inexperienced talent, like a security generalist, who will move into a specialty in a year or two. It's really difficult to attract and retain the specialists."
Pike said he's heard of security specialists moving into managerial roles in corporations who can make $250,000. One such manager moved into the vice president level and made $750,000, he said. With salaries at such high levels, smaller companies often have to resort to taking out an incident response retainer with a service provider for a year to protect against exploits.
Analysts said it isn't necessarily that there aren't cybersecurity candidates available to fill positions, but there might be a lack of candidates to fill the positions that are open at the time.
Gartner in a recent report said that there is a "war for cyber talent as organizations seek qualified candidates in an environment where demand outweighs supply." Gartner noted that the Bureau of Labor Statistics expects the demand for cybersecurity professionals to increase by 53% through 2018.
Gartner also said security budgets in U.S. companies are not increasing enough to keep up with salaries for cybersecurity professionals that have "skyrocketed."
The cybersecurity labor gap is already causing "major vulnerabilities," said Gartner analyst Avivah Litan, in an email. "Many organizations are turning to outsourced and managed security services to fill their cybersecurity skill gap, but those managed services firms are facing their own recruitment challenges since there just aren't that many skilled cybersecurity professionals to fill the gaps."


Thursday, January 12, 2017

FIOS internet is down

Just spoke to a representative to let her know that my FIOS has been out and that I do not have access at the ONT. Apparently the technicians  had not informed customer service of wide spread outages in VA, PA and MD.

Verizion is in need of some process improvements. I hope they get ahead of this before the morning rush in about 3 hours. I didnt ask if there is a differentprocess for buisness customers, I hope so.

Fios internet is down but TV still works I know they utilize MoCa between boxes in the house  to stay synced for time and DVR.

Sunday, January 8, 2017

(Draft in progress) National_cyber security_workforce_framework and Cyber career paths

National_cyber security_workforce_framework (NCWF) and Cybersecurity career paths

Aligning the NCWF and Cybersecurity career paths
Ultimately the goal is to do something you like to do, provide for your family and take care of your responsibilities; although I have had genuine success in meeting this three objectives I can also say that i understand simply wanting to move into a career field that has momentum. (insert job forecast)
I hope that by discussing both the National framework and the various career paths that I can demystify what cyber security is in respect to Information Technology as well as provide some ad hock guidance to prepare cyber workforce prospects for a very rewarding career

cyber-security-workforce-framework 2016
"The National Cybersecurity Workforce Framework  provides a blueprint to categorize, organize, and describe cybersecurity work into Specialty Areas, tasks, and knowledge, skills, and abilities (KSAs)." It represents the broadest overarching dialogue on jobs, skill sets and workforce expectations in respect to each distinct functionality. This does not, however represent a strict skill set trajectory, since individuals may have multiple functions based on the size and strategic objectives of the organization. The Investigate and Operate/ Maintain functions are a practical example where an organization could benefit from combining the functionalities into one Job requirement.
The NCWF also "provides a common language to speak about cyber roles and jobs and helps define personal requirements in cybersecurity."

Cyber Security Market:






Cyber-security-career-paths:




Cyber Security Certifications:





















courtesy:
IT Security Career Paths and Certifications
Course by: Marc Menninger
http://www.cyberdegrees.org/listings/masters-degrees/

Thursday, January 5, 2017

Congressional Hearing on Cyber


Full Video:

Intel Chiefs testify on US Cyber Operations

Speed, agility, organization, workforce improvement are necessary. Improved communication with critical infrastructure and civilian industry.[ WTFO, the guy behind Senator Jack Reed has his badge out that is a security concern, he is too busy on his phone.]
DHS and NIST still on the hook for controls and best business practices

 The cyber domain does not have the same boundaries as nuclear deterrence. But has similar consequences in my opinion from a collateral aspect. 

Damn did Dir. Clapper just say we don't have the Cyber capabilities to deter Cyber attacks from rogue nations states?  Sen Wicker just asked an earnest question on what do we do via our national power. Prevent, Detect, respond, and sustain methodology as Sen. McCain just implied case by case response is not a very good policy I agree that repeatable processes are the norm, however, initial response will require cyber agility while an overarching National policy is more reflective of our national powers as a deterrent. Unfortunately, our current policy does not seem to be up to par. Critical infrastructure is the key and the workforce is the foundation. 

STEM programs are not enough we need to incorporate STEM aspects throughout our primary and secondary education. Definitely, something industry local governments and federal government can improve on via robust education overhaul and cooperation. We have to invest in the future in order to become less reactive and become more proactive.

Thursday, December 15, 2016

Tuesday, December 13, 2016

Monday, December 12, 2016

Wednesday, December 7, 2016

LAB/ Malware ref.






Social engineering video




Hacked 





Social engineering tutorial 



Tuesday, December 6, 2016




Whoooooa!!!





Here is the Network layout : The intent was to have everything traverse the security stack
Home Cyber Defense and Pentest-Forensic LAB