IS MY DATA TRULY GONE?

6.26.23 > Rebecca Duvick I regularly get asked whether the data on equipment we receive as part of our electronics recycling program is truly gone after it’s wiped.  The answer, based on the processes we use, is yes!  Electronics recycling is an important but often overlooked aspect of cyber security.   With cyber risk around every […]

Read more

Tennessee’s New Privacy “Shield”: 3 Tips for Approaching the NIST Privacy Framework

6.21.23 > Jerrod Montoya There are now 10 comprehensive privacy laws enacted in the United States. The new laws in 2023 include those in Montana, Indiana, Iowa, Tennessee, and Texas. These laws join already existing laws including California, Utah, Colorado, Virginia, and Connecticut. These laws all share commonalities that resemble the EU’s Global Data Protection […]

Read more

The SEC’s Proposed Cybersecurity Rules: Is Your Company Ready?

6.14.23 > Phil Schenkenberg Here in the United States, companies face a patchwork of legal obligations that address information security and data privacy. For example, federal laws target certain market segments (such as health care, financial services, and education), state laws target certain types of information (such as personal financial or biometric information), and both […]

Read more

TAKING ON CYBER WORKFORCE CHALLENGES

6.7.23 > Tim Herman It is no secret that there is an ever-growing challenge with finding good people for the now nearly 750,000 open Cyber Security jobs in our country.  Companies are scrambling to find new and different ways to tackle this mountain.  We are still seeing an impact from the Great Resignation across the […]

Read more

CYBERSECURITY ADVISORY – PEOPLE’S REPUBLIC OF CHINA STATE-SPONSORED CYBER ACTOR LIVING OFF THE LAND TO EVADE DETECTION

6.1.23 > via InfraGard Cybersecurity Advisory – People’s Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection Click this link to read the Cybersecurity Advisory > jca_actor_living_off_land

Read more

BEST IN CLASS

5.31.23 > Paul Hershberger I was recently engaged in a conversation with some colleagues in the cybersecurity industry and they posed a question along the lines of; ‘how do you define best in class’? I was really eager to dive into this one and confident that I had the answer, and it was going to […]

Read more

THE EVOLUTION OF MULTI-FACTOR AUTHENTICATION

5.24.23 > Brian Kenyon Multi-factor authentication is — thankfully — a normal part of our digital experience. Whether at work, connecting with your bank, or logging in to social media, we’re used to the extra step of entering a short code or acknowledging a push notification during login. Attackers are on the hunt In recent […]

Read more

THE PEOPLE SIDE OF CYBER RESILIENCE – ADVICE FOR SECURITY LEADERS AND PROFESSIONALS

5.17.23 > Kristine (Kristy) Livingston This year the Cyber Security Summit theme is “Resilience Unlocked”. As we discuss and plan cyber resiliency in our security programs, leaders must prepare for resilience on their teams, the careers of the people on their team, and their own lives. Resilience in our Teams: Resilience is the preparation for […]

Read more

IMPACT OF CYBERSECURITY ON MEDICAL DEVICES: FDA NEW REQUIREMENTS

5.15.23 > Scott Singer The impact of a cybersecurity attack on a medical device can have negative effects on patient safety.  In addition, there are privacy concerns that can arise from the data gathered from such devices.  Whether it is patient safety or patient privacy, the FDA is now putting out specific guidance in a […]

Read more

CISA ALERT > SNAKE MALWARE THREAT FROM RUSSIAN ACTORS

5.10. 23 SPECIAL NEWS ALERT CISA and Partners Disclose Snake Malware Threat From Russian Cyber Actors 05/09/2023 11:00 AM EDT Today, CISA and partners released a joint advisory for a sophisticated cyber espionage tool used by Russian cyber actors. Hunting Russian Intelligence “Snake” Malware provides technical descriptions of the malware’s host architecture and network communications, and mitigations […]

Read more

SECURITY AND COMPLIANCE – LIKE PB&J, BETTER TOGETHER

5.8.23 > Aimee Martin Let’s start with definitions.  Although there are many different definitions out there for security and compliance, here is a simplistic version: Security – systems, controls, and processes a company designs to internally protect assets. Compliance – meeting the standards a third-party has determined best practice or legal requirement. They are NOT […]

Read more

LITTLE FIRES EVERYWHERE: HOW UNINTENTIONAL INSIDER THREATS LEAD TO POOR ORGANIZATIONAL RESILIENCY

5.3.23 > Shayla Treadwell, Ph.D. As a cybersecurity professional, working in a volatile, uncertain, complex, and ambiguous world means consistently putting out fires. When thinking about putting out small fires, typically one would think of working through small problems that need to be solved quickly before they become bigger. But what happens when there are […]

Read more

LEADERSHIP TO OVERCOME CYBERSECURITY’S PERCEPTION AS A COST CENTER

5.1.23 > CDR Chip Laingen, USN (Ret.), MPA My current roles in business and academia have afforded me two uniquely rewarding perches from which to view innovation, both in terms of the creation of products and services, and the leadership and management of them. As the director of a large technology-focused business alliance, I’m immersed […]

Read more

INTEGRATING ENTERPRISE SECURITY CONTROLS INTO THE BROWSER

4.24.23 > Matt Hoyland for Island “Sometimes changing one thing changes everything.  The Browser is the Enterprises most used application, but Browser’s traditional focus has been for Advertisements and Content Delivery.  Our friends at Island reimagine the Browser to give Enterprises full control of their data and how it interacts with other applications.  The TAG Cyber team recently took […]

Read more

“COMING HOME TO A PLACE HE’D NEVER BEEN BEFORE…”

4.19.23 > Tony Sager I just checked – my first connection to the Minnesota Cyber Summit was in 2016 as a speaker.   In fact, I think it was the first time I had ever set foot in the State of Minnesota. How the cyber-time flies (even if progress feels glacial!)   I forget the details, but […]

Read more