https://www.youtube.com/watch?v=SeJKFBEsWY0 Today we talk about how you can use Step 1 of the NIST Model to mitigate Cyber Security Risks in your Enviroment. The First step to to take an inventory of your enviroment so you can understand what you are trying to defend. Kip Kirchberg is an International Cyber…
The Detect Function of NIST enables timely discovery of cybersecurity events. Examples of outcome Categories within this Function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes. In order to detect cyber security events in your environment you should deploy a SIEM. A SIEM or Security information and event…
Today we talk about how you can use Step 2 of the NIST Model to mitigate Cyber Security Risks in your Enviroment. The second step is to protect your enviroment using several layers of security. https://www.youtube.com/watch?v=64dRPvpI-Lc Kip Kirchberg is an International Cyber Security Expert who has experiance building Cyber…
Enterprise Insight of the top Ten Cyber Security Initiatives for 2020 https://youtu.be/-YwB48uw0mM 10. Anti Virus or Application Whitelist Technologies. While Anti-Virus tools are affective against known signature threats the industry is struggling to keep up with ever evolving virus and malware threats. Application whitelisting or micro using various layers of…
The Detect Function of NIST enables timely discovery of cybersecurity events. Examples of outcome Categories within this Function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes. In order to detect cyber security events in your environment you should deploy a SIEM. A SIEM or Security information and event…