Tag Archive for: Assessing

Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense WeaknessesWebinar.


Anti-Phishing, DMARC
,
Cybercrime
,
Email Security & Protection

OnDemand | Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses

Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses.


But with a strategic approach to cyber defense you can hack the hacker before they strike! In this session, we’ll share insights into their strategies and their motivations. You’ll learn how to use that understanding, along with simple strategies to make your organization a hard target.


In this webinar, Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, exposes the mind of a hacker to help you see your cyber risks from the outside in.


In this session you’ll learn:

  • How hackers collect “private” details about your organization and your users
  • The most common root causes that lead to damaging cyber attacks
  • Common mistakes made when designing cyber defenses and how to fix them
  • Data-driven strategies for mitigating your biggest weaknesses
  • Why a strong human firewall is your best, last line of defense

Get the details you need to know now to outsmart cybercriminals before you become their next victim!

Source…

Assessing the Non-Kinetic Battlespace | The Heritage Foundation


Kinetic warfare continues to evolve, though its brutality is enduring (as witnessed by the current war in Ukraine). But in the shadows, a preview of future conflict is playing out—that hybrid, non-kinetic future war.

Cyberwarfare, electronic warfare, information operations, intelligence, and space technology all came into play in the lead-up to the Ukraine war, and remain salient. The ongoing conflict offers many lessons that can help the United States and its allies not only to assist the Ukrainians in resisting Russian aggression, but also to prepare the West to prevail in future conflicts. All sides are keenly watching these “gray-zone” tactics play out, hoping to determine how best to use them for the battlespaces of tomorrow.

Prior to its invasion of Ukraine, the Kremlin had already used cyber and informational warfare, with varying levels of effect, in Estonia, Georgia, and Ukraine. Thus, when Russian tanks rolled into Ukraine in February, many experts expected to see coordinated, large-scale offensive cyber and electronic warfare operations aimed at severing communications in much of Ukraine. Also expected was a replay of previous power grid tactics meant to undermine confidence and stability in the government of Ukrainian president Volodymyr Zelensky.

The expected attacks did, in fact, come in the early days of the war. But many were stymied or blunted by cyber defense preparation, aggressive remediation, and timely assistance from allied partners and private-sector technology and cybersecurity companies who helped identify problems and provide solutions to Ukrainian networks. Microsoft, for example, identified and attributed a vast network of Russian activity that preceding physical battlespace movements in the war.

Today, Russia continues to pursue aggressive hybrid actions in tandem with brutal land, air, and sea warfare. And allied and private sector partners continue to help Ukraine battle back. Through it all, these players as well as other world nations are watching to determine what has worked, and what has not. Those who learn the lessons now playing out in Ukraine will gain a greater understanding of how to deal with future shadow-war challenges—and,…

Source…

Assessing and Addressing Your Organization’s Cyber Defense Weaknesses — Redmondmag.com


Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses

Date: Thursday, October 06 at 11am PT / 2pm ET

Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses.

But with a strategic approach to cyber defense you can hack the hacker before they strike! In this session, we’ll share insights into their strategies and their motivations. You’ll learn how to use that understanding, along with simple strategies to make your organization a hard target.

Join Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, for this new webinar as he exposes the mind of a hacker to help you see your cyber risks from the outside in.

In this session you’ll learn:

  • How hackers collect “private” details about your organization and your users
  • The most common root causes that lead to damaging cyber attacks
  • Common mistakes made when designing cyber defenses and how to fix them
  • Data-driven strategies for mitigating your biggest weaknesses
  • Why a strong human firewall is your best, last line of defense

Get the details you need to know now to outsmart cybercriminals before you become their next victim.

Register now!

About the presenter:

Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 13 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Defense Evangelist for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.

Date: 10/06/2022

Time: 11:00am PT


Source…

Assessing the aims of the Government Cyber Security Strategy


January saw the UK government publish yet another cyber security strategy, the Government cyber security strategy 2022, not to be confused with the National cyber strategy 2022published only a month earlier.

This new strategy is focused on ensuring the government’s critical functions are hardened to cyber attack by 2025, with all public sector organisations becoming more resilient to cyber threats by 2030. This clear aim is welcome, but is it realistic or achievable? 

The timelines set out in the strategy are incredibly tight. Government departments have many competing demands on them, budgets are under pressure and cyber security is not at the top of many of their priorities. Implementing the strategy by 2025 will be difficult.

The strategy has two pillars: build a strong foundation of organisational cyber security resilience, underpinned by the adoption of the NCSC Cyber Assessment Framework (CAF); and “defend as one”, which will be enabled by the establishment of a Government Cyber Coordination Centre (GCCC). These pillars link to the National Cyber Strategy’s key message of alignment and integration across government.

In addition, these pillars are supported by five objectives:

  • Manage cyber security risk;
  • Protect against cyber attack;
  • Detect cyber security events;
  • Minimise the impact of cyber security incidents;
  • Develop the right cyber security skills, knowledge and culture.

All these are sensible and provide an easy-to-understand approach to build a transformation programme around. However, experience suggests these objectives are difficult, costly and time-consuming to achieve, especially in operations-focused government departments. 

Integration will be key

Success will be determined by the levels of integration achieved across government, regions, with industry partners and specialist organisations, maybe even with our international allies.

The strategy enables cross-government integration through the creation of the GCCC and the use of the CAF. It will also be important to integrate with all the people required to deliver this strategy – it is not just about cyber security specialists. Human resources, commercial, and technology…

Source…