If you couldn't attend our Black Hat session... We had the pleasure of chatting with Cyrus Tibbs, CISO at PENNYMAC. In his presentation, he shared how his team is utilizing tools to create a top-notch security stack for their operations. Here are the key takeaways: https://hubs.li/Q02KTvK80
Hunters’ Post
More Relevant Posts
-
Highlight of RSA was the seeing Rori Boyce-Werner, Shelby Descoteaux, CISSP, Elizabeth Hubbard, and Shawn Powers, session “OperandAI: Practical Security for Artificial Intelligence” - great panel!
To view or add a comment, sign in
-
Published Author and Chief Security Strategist at Analyst1 (Author of SANS Difference Maker Award Book of the Year 2022 AND 2023!) Author of the Ransomware Diaries, DEFCON speaker and featured on 60 Minutes.
I had a great conversation with Dave Bittner and N2K | CyberWire about ransomware and my latest research. We discuss the research and what it’s like to get to know the bad guys behind these crimes! This one is definitely worth the listen!
Check out our newest episode of #ResearchSaturday! This week we are joined by Jon DiMaggio, Chief Security Strategist for Analyst1, as he discusses his research titled "Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC." Join Jon and Dave as they dive head first into his findings after going toe to toe with the lead criminal who runs RansomedVC. https://lnkd.in/eBghsa9w
To view or add a comment, sign in
-
Computerworld Columnist, writer for CSO Online, CIO.com, podcaster, blogger. Focuses on cybersecurity and analytics issues for IT and Security enterprise executives.
Just finished a deep-dive into the SEC rules, based on interviews with various key enterprise CISOs, along with analysis of the latest SEC guidance. The upshot: the rules are contradictory and just vague enough to do no direct assistance to investors. But it just might force non-security C-levels to focus on cyber about 50 times more than they do today–which is never. https://lnkd.in/e2WA4_cH
To view or add a comment, sign in
-
When Kudelski Security's Graeme Payne was a CIO at Equifax, the company was breached. This guide contains plenty of actionable insights – based on his experience – for security leaders looking to navigate the breach. Get your guide >> https://kdlski.co/3H50hfU
To view or add a comment, sign in
-
Meet Cobalt at Black Hat 2024 🎩 📍 Stop by Booth 2913 to discover how Cobalt's Offensive Security solutions can mitigate risk across an ever-evolving attack surface. 🖥️ Also, you can book a demo and schedule a 1 - 1 meeting and learn more about our Cobalt Solution in action.
Meet with Cobalt at Black Hat USA | Cobalt
event.cobalt.io
To view or add a comment, sign in
-
Check out our collection of recommended privacy and risk books from the Security, Audit and Leadership series. See the full series at: https://lnkd.in/gZJyNdhY Dan Swanson
To view or add a comment, sign in
-
Automated Incident Response (AIR) @ Binalyze | Cyber Resilience | Cloud Investigation & Response Automation (CIRA) | CSIRT + CIRT |
Panaseer helps organisations proactively understand their security posture with automated trusted security metrics using Continuous Controls Monitoring (CCM). Panaseer provides Cyber Asset Management - A trusted inventory of all assets that is business enriched with context, criticality and ownership and Security Controls Management – The ability to understand security control effectiveness and identify gaps in protection across eight security domains: Vulnerability Management, Endpoint Management, Patch Management, Identity and Access Management, Privileged Access, Security Awareness, Cloud Security & Application Security. By taking all the data from disparate business, IT and security tools and bringing it together using data science; we give organizations the ability to prioritize risk based on business context, so they can make better decisions and prioritize and track remediation campaigns all of which is helping organizations fully understand their security posture without the need for manual reporting 📊
"The SOC treats the symptoms. Good engineering and consistent behaviors fix the problems." Hear how Dave Ferguson mitigates the risk from ransomware in our latest webinar, hosted by Nick Lines. https://lnkd.in/gsTQxs8c
To view or add a comment, sign in
-
Like Varun Sharma mentioned, we're excited to be going to BlackHat 2024! If you will be attending and are looking to learn more about StepSecurity, or CI/CD Security as a whole, please reach out. We would be eager to chat while there! #BlackHat #StepSecurity
Jake Karger and I will be in Las Vegas on August 7th and 8th for #BlackHat 2024! If you’ll be there, we’d love to see you and talk about all things CI/CD Security.
To view or add a comment, sign in
-
Modern systems should be Scalable, Resilient, and Secure. But the urgency of protecting against zero-day exploits means we rely heavily on vendors to ensure quality. The CrowdStrike incident showed just how fragile our technology ecosystem can be when Vulnerability Management and Change Management procedures are not up to par. Don’t leave your systems vulnerable! Join Benjamin Simon at #BlackHat to discover how you can achieve the benefits of a modern system architecture in OT/ICS, even with your legacy applications.
I've heard from others at the BlackHat trainings this year that the recent CrowdStrike debacle is the elephant in the room. I will be in Vegas for the day this Wednesday (August 7th) for meetings with cyber professionals from across the industrial world. The topic of our discussions? How to patch and upgrade critical industrial applications while maintaining availability and process integrity, without compromising resilience—or, in other words, how to avoid a CrowdStrike-esque failure in OT. If anyone else is around and wants to meet up, please drop me a note. It'll be HOT, so I'll buy you ice cream or a cold drink—on Fortress Labs 😀
To view or add a comment, sign in
-
Are you ready to elevate your OT/ICS systems to the next level? Join Benjamin Simon at #BlackHat and discover how you can implement a cutting-edge technology framework for your operational technology and industrial control systems. Leverage Virtualization: Learn how virtualization can help you optimize resource utilization, reduce costs, and improve system performance. Get the benefits of Containerization: Explore the benefits of application containerization, including faster deployment, improved portability, and enhanced security without an application rewrite. Stay Ahead of Threats: Understand how to protect your systems from emerging cyber threats. Maximize Efficiency: Discover strategies to enhance scalability, resilience, and security in your infrastructure. Don’t miss this opportunity to revolutionize your OT/ICS systems! Meet Benjamin Simon at #BlackHat and take the first step towards a more secure and efficient future.
I've heard from others at the BlackHat trainings this year that the recent CrowdStrike debacle is the elephant in the room. I will be in Vegas for the day this Wednesday (August 7th) for meetings with cyber professionals from across the industrial world. The topic of our discussions? How to patch and upgrade critical industrial applications while maintaining availability and process integrity, without compromising resilience—or, in other words, how to avoid a CrowdStrike-esque failure in OT. If anyone else is around and wants to meet up, please drop me a note. It'll be HOT, so I'll buy you ice cream or a cold drink—on Fortress Labs 😀
To view or add a comment, sign in
21,791 followers