BETTER TOGETHER: IT/OT COLLABORATION

8.28.23 > Guest Blog Feature >Thomas Tomalla, Jr. History and Conflicting Priorities I’ve worked in situations where Information Technology (IT) teams and Operational Technology (OT) teams are different and don’t get along. The goal of this article is to demystify OT systems for IT teams, and help find common ground – Technology and Risk Management. […]

Read more

SERVING ALL COMMUNITIES TO BUILD A SAFER MINNESOTA

8.23.23 > Eric Roeske Cyber Security Summit Think Tank representatives bring a fantastic mix of experience and expertise to ensure the Summit offers quality for a variety of audiences. Captain Eric Roeske of the Minnesota State Patrol is a Think Tank member who has more than 20 years of public service and additionally holds a Master […]

Read more

AI (ARTIFICIAL INTELLIGENCE) ENHANCED SAT (SECURITY AWARENESS TRAINING)

8.9.23 > Jeffrey Peal III Artificial intelligence (AI) is rapidly changing the way we live and work, and the field of information security is no exception. AI can be used to automate many of the tasks involved in information security, such as threat detection, incident response, and compliance reporting. However, AI can also be used […]

Read more

HOW TO MOVE THE PROVERBIAL SECURITY NEEDLE WITHOUT GOING OVER BUDGET

8.7.23 > Jeff Norem “We have enough security budget to properly protect the organization and meet all of our risk and compliance obligations,” said almost no CISO ever – especially those at small- to midsized organizations. Most of us know budgets will always be tight, so how can we continue to improve without budget busting? […]

Read more

HEALTH SECTOR CYBERSECURITY COORDINATION CENTER – HC3: ANALYST NOTE Report: 202307211200

Click Here for the original note >  hc3_remote_id_management

Read more

JOINT CYBERSECURITY ADVISORY – PREVENTING WEB APPLICATION ACCESS CONTROL ABUSE

Click the link to access > joint_csa_preventing_web_application_access_control_abuse

Read more

CYBER RESILIENCE: PROTECTING PEOPLE AND DATA

7.26.23 > Lee Ann Villella Protecting people and defending data in the face of cyber threats is crucial based on trends and patterns that have emerged in the cybercriminal landscape. Several key factors include: Evolution of Cybercriminal Business Models: Cybercriminals have honed their strategies and now primarily focus on three profitable business models: ransomware, data […]

Read more

BECOMING A CYBER-AWARENESS CHAMPION

7.24.23 > Mark Ritchie I was sworn-in as Minnesota’s elected Secretary of State in January of 2007. During my first year in office, when I was still “learning the ropes,” I faced a challenge never considered in all my years of preparing to lead this office – a cyber-attack. Early one Monday morning I received […]

Read more

CYBER RESILIENCE IN A COMPLEX WORLD

6.28.23 > Rohit Tandon We live in a world full of surprises. Sometimes events around us go unnoticed, and at other times similar events have the potential to disrupt. Smart folks will develop predictive models of how a specific event can impact our world and are forever tuning these models for that elusive accuracy. For […]

Read more

IS MY DATA TRULY GONE?

6.26.23 > Rebecca Duvick I regularly get asked whether the data on equipment we receive as part of our electronics recycling program is truly gone after it’s wiped.  The answer, based on the processes we use, is yes!  Electronics recycling is an important but often overlooked aspect of cyber security.   With cyber risk around every […]

Read more

Tennessee’s New Privacy “Shield”: 3 Tips for Approaching the NIST Privacy Framework

6.21.23 > Jerrod Montoya There are now 10 comprehensive privacy laws enacted in the United States. The new laws in 2023 include those in Montana, Indiana, Iowa, Tennessee, and Texas. These laws join already existing laws including California, Utah, Colorado, Virginia, and Connecticut. These laws all share commonalities that resemble the EU’s Global Data Protection […]

Read more