01 Jul 24 Critical Tabletop Scenarios CISOs Should Be Performing Right Now Joe Sullivan No Comments Discover the top tabletop scenarios CISOs should perform to improve cybersecurity readiness, including ransomware, insider threats, and more. Read More
01 Jul 24 How to Discuss Risk and Is Threat a Better Perspective? Joe Sullivan No Comments Discover the benefits of a threat-centric approach to discussing risk in cybersecurity. Improve engagement and understanding with clear communication. Read More
29 Jun 24 Monitoring Microsoft 365 for Business Email Compromise Joe Sullivan No Comments Discover strategies for monitoring Microsoft 365 for Business Email Compromise (BEC) threats and protecting your organization from attacks. Read More
29 Jun 24 Making Governance, Risk, and Compliance Fun Joe Sullivan No Comments Learn how to make GRC fun and engaging for your organization with strategies like interactive training, gamification, and GRC trivia. Read More
29 Jun 24 Understanding Indicators of Compromise Joe Sullivan No Comments Explore the importance of Indicators of Compromise (IOCs) in cybersecurity. Learn how to obtain, utilize, and relate them to Tactics, Techniques, and Procedures (TTPs). Read More
29 Jun 24 Dealing with High-Maintenance People Joe Sullivan No Comments Discover strategies to handle high-maintenance individuals in cybersecurity. Encourage self-reliance, set boundaries, and promote accountability. Read More
29 Jun 24 Incident Response on a Budget Joe Sullivan No Comments Discover open source tools for budget-friendly incident response, including their pros, cons, and best use cases for effective cyber defense. Read More
29 Jun 24 Logs in Windows Environments Joe Sullivan No Comments Discover the key logs and telemetry needed for effective incident response in Windows environments, and how to configure them for optimal security. Read More
28 Jun 24 Nuke It from High Orbit: The Pitfalls of the Greenfield Approach Joe Sullivan No Comments Learn why the greenfield approach in ransomware recovery has significant pitfalls and discover effective alternative strategies. Read More
28 Jun 24 In-House Cybersecurity Assessments: What They Involve Joe Sullivan No Comments Learn about in-house cybersecurity assessments, their importance, and best practices for conducting thorough and effective evaluations. Read More