Information Security Leader, Author, Instructor and Speaker

Default utility Image

XDR: The Next Evolution in Endpoint Detection and Response? TAGS: | There’s a new security solution in town and it’s rapidly gaining traction. As with many security technologies that have come …Continue reading →

Default utility Image

5 Ways to Update An Agency’s Incident Response Plan TAGS: | Quick, find a copy of your agency’s cybersecurity incident response plan. Pull that binder off the shelf or call up …Continue reading →

Default utility Image

5 critical steps to creating an effective incident response plan TAGS: | Cybersecurity professionals around the world work to prevent security incidents that would undermine the confidentiality, integrity or availability of their …Continue reading →

Default utility Image

Automating incident response with security orchestration TAGS: | Cybersecurity incidents occur on a daily basis at most large organizations. This steady stream of incidents poses a challenge for …Continue reading →

Default utility Image

The CIO’s Playbook: Preparing for Data Breach Notifications TAGS: | | “The days and hours immediately after a data breach are critical,” said Mike Chapple, adjunct research analyst with IDC’s IT …Continue reading →

Default utility Image

5 Tips for Updating a Cybersecurity Incident Response Plan TAGS: | Many security teams are operating with incident response plans that haven’t been updated — or even looked at — in …Continue reading →

Incident Response with NetFlow For Dummies TAGS: | Learn how NetFlow analysis can dramatically accelerate incident response by delivering complete network visibility to discover, investigate, and counteract a …Continue reading →

Default utility Image

Building a Security Incident Response Program TAGS: “Boss, I think we might have a security problem.”  There are few words more likely to strike fear in the …Continue reading →