Cyber Security Summit Blog

5.10. 23 SPECIAL NEWS ALERT CISA and Partners Disclose Snake Malware Threat From Russian Cyber Actors 05/09/2023 11:00 AM EDT Today, CISA and partners released a joint advisory for a sophisticated cyber espionage tool used by Russian cyber actors. Hunting Russian Intelligence “Snake” Malware provides technical descriptions of the malware’s host architecture and network communications, and mitigations to help detect and defend against this threat. CISA urges organizations to review the advisory for more information and apply the recommended mitigations and detection guidance. For more information on FSB and Russian state-sponsored cyber activity, please see the joint advisory Russian State-Sponsored and Criminal Cyber Threats to ...
5.8.23 > Aimee Martin Let’s start with definitions.  Although there are many different definitions out there for security and compliance, here is a simplistic version: Security – systems, controls, and processes a company designs to internally protect assets. Compliance – meeting the standards a third-party has determined best practice or legal requirement. They are NOT the same.  You can be compliant and not secure, and you can be secure but not compliant. Compliant but not secure – are able to check the boxes, have strong policies and procedures, but they are inconsistently adopted and often do not meet the “spirit ...
5.3.23 > Shayla Treadwell, Ph.D. As a cybersecurity professional, working in a volatile, uncertain, complex, and ambiguous world means consistently putting out fires. When thinking about putting out small fires, typically one would think of working through small problems that need to be solved quickly before they become bigger. But what happens when there are many small fires? What risks do you open your organization up to when people unintentionally open themselves up to risk? Targeting unintentional insider threats all organizations to build security-first cultures while building organizational resiliency so that if something goes wrong you don’t simply bounce back ...
5.1.23 > CDR Chip Laingen, USN (Ret.), MPA My current roles in business and academia have afforded me two uniquely rewarding perches from which to view innovation, both in terms of the creation of products and services, and the leadership and management of them. As the director of a large technology-focused business alliance, I’m immersed in the corporate cultures and strategic plans of many diverse businesses, large and small.  And as a graduate faculty member for masters-level degree programs, I’m privileged to witness mid-career professionals study challenges within their firms and put forth recommendations to fix them through their capstone ...
4.24.23 > Matt Hoyland for Island "Sometimes changing one thing changes everything.  The Browser is the Enterprises most used application, but Browser's traditional focus has been for Advertisements and Content Delivery.  Our friends at Island reimagine the Browser to give Enterprises full control of their data and how it interacts with other applications.  The TAG Cyber team recently took a look at the Enterprise Browser, and makes a very compelling case on why it should be included in compliance frameworks." This note introduces a set of cybersecurity requirements that should be integrated into the browser and included in major compliance frameworks to counter common ...
4.19.23 > Tony Sager I just checked – my first connection to the Minnesota Cyber Summit was in 2016 as a speaker.   In fact, I think it was the first time I had ever set foot in the State of Minnesota. How the cyber-time flies (even if progress feels glacial!)   I forget the details, but the connection between the non-profit Center for Internet Security and the Minnesota cyber community was triggered by Colonel Stefanie Horvath (now BGEN) of the MN National Guard. One thing led to another, and I was invited to give a talk at the event. (Making Best ...
4.17.23 > Milinda Rambel Stone Imagine. Imagine an organization that has visibility into its cybersecurity risks and actively makes sustainable, risk-based business decisions that are measurable and quantifiable. This idea is one that must be created. As an information security community, we need to drive this change for continued business and operational relevance. Design. We must first start by incorporating security risk in all business and technology decisions. Using an industry respected security control framework such as NIST SP 800-160 and engineering risk decisioning across your security control environment is a logical starting point. By proactively architecting and designing a ...
4.12.23 > Michelle Greeley As outsourced business models continue to rise in popularity, cybersecurity threats facing organization supply chains are growing unprecedentedly, requiring stringent third-party risk mitigation and the utmost awareness of management teams alike. Throughout 2022, companies spent over $700 billion on establishing or expanding outsource capabilities. Breaking this down by segment, IT outsource spending is expected to reach $519 billion in 2023, a 22% increase over 2019’s numbers. Similarly, business process outsource spending is forecasted to total $212 billion in 2023, an increase of 19% over 2019 . The threat landscape of malware, ransomware, phishing attacks, and viruses ...
4.10.23 > Chris Buse Chief Information Security Officers (CISOs) face a daunting challenge: keeping abreast of and demonstrating compliance with constantly changing compliance requirements. CISOs frequently use the term “compliance bar”, which implies that there is single set of regulatory guidance to pick up and read. That is not the case. A significant challenge is normalizing requirements from numerous state and national regulators, none of which use common nomenclature. In effect, every CISO must create and maintain his or her own compliance bar. The Bar Keeps Rising The common themes of regulators in the financial services sector are more granular ...
4.5.23 > Gregory Ogdahl In today's digital age, cyber threats are becoming increasingly sophisticated and frequent. Organizations must take a proactive approach to safeguard their data, systems, and networks against cyberattacks. A resilient, highly trained, and ready cyberspace operations and intelligence team is essential to achieve this objective. Building such a team requires a combination of strategic planning, recruitment, training, and retention efforts. In this brief article, I propose a few key concepts and ideas to build a resilient, highly trained, and ready cyberspace operations and intelligence team, to include minimizing attrition. Develop a comprehensive talent acquisition strategy The first ...