CISA ALERT – CRITICAL INFRASTRUCTURE DEFENSE TIPS

CISA shares critical infrastructure defense tips against Chinese hackers By Sergiu Gatlan /Bleeping Computer CISA, the NSA, the FBI, and several other agencies in the U.S. and worldwide warned critical infrastructure leaders to protect their systems against the Chinese Volt Typhoon hacking group. Together with the NSA, the FBI, other U.S. government agencies, and partner Five […]

Read more

INDUSTRY PARTNER SPOLTIGHT: THE INFRAGARD

3.13.24 > Elizabeth Stevens Back in 2013, FBI Minneapolis Special Agent Liz Lehrkamp was assigned to the cyber squad and served as the liaison to the InfraGard program. Liz joined the Cyber Security Summit to add government perspective alongside academic, military and private sector advisory board representatives, and that relationship continues today via FBI Private Sector […]

Read more

CYBER STUDENT INSIGHTS

2.28.24 EDITOR’s NOTE: My role as Communications Director involves outreach with our professional association industry partners, and one of the first meetings I attended was a chapter gathering of the Military Cyber Professionals Association. Think Tank member and MCPA President Brian Morgan introduced me to the group, I gave a quick Summit pitch, and stayed […]

Read more

THE ROLE OF NSA AND CISA IN CYBERSECURITY

10.18.23 > Paul Veeneman The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) are two pivotal entities in the U.S. responsible for maintaining the nation’s security and resilience against cyber threats. The NSA is largely tasked with global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence […]

Read more

THE BURNOUT BLOG

9.19.23 > Brian Morgan Security burnout. A topic not often discussed, but certainly often experienced. Allow me to read off a few keywords for you here. Ready? EternalBlue. WannaCry. NotPetya. Heartbleed. Shellshock. Solarwinds. Log4J. Is your heart racing? Are your palms sweating? Are you dizzy, perhaps? If not, then chances are you either don’t work […]

Read more

BETTER TOGETHER: IT/OT COLLABORATION

8.28.23 > Guest Blog Feature >Thomas Tomalla, Jr. History and Conflicting Priorities I’ve worked in situations where Information Technology (IT) teams and Operational Technology (OT) teams are different and don’t get along. The goal of this article is to demystify OT systems for IT teams, and help find common ground – Technology and Risk Management. […]

Read more

SERVING ALL COMMUNITIES TO BUILD A SAFER MINNESOTA

8.23.23 > Eric Roeske Cyber Security Summit Think Tank representatives bring a fantastic mix of experience and expertise to ensure the Summit offers quality for a variety of audiences. Captain Eric Roeske of the Minnesota State Patrol is a Think Tank member who has more than 20 years of public service and additionally holds a Master […]

Read more

AI (ARTIFICIAL INTELLIGENCE) ENHANCED SAT (SECURITY AWARENESS TRAINING)

8.9.23 > Jeffrey Peal III Artificial intelligence (AI) is rapidly changing the way we live and work, and the field of information security is no exception. AI can be used to automate many of the tasks involved in information security, such as threat detection, incident response, and compliance reporting. However, AI can also be used […]

Read more

HOW TO MOVE THE PROVERBIAL SECURITY NEEDLE WITHOUT GOING OVER BUDGET

8.7.23 > Jeff Norem “We have enough security budget to properly protect the organization and meet all of our risk and compliance obligations,” said almost no CISO ever – especially those at small- to midsized organizations. Most of us know budgets will always be tight, so how can we continue to improve without budget busting? […]

Read more

HEALTH SECTOR CYBERSECURITY COORDINATION CENTER – HC3: ANALYST NOTE Report: 202307211200

Click Here for the original note >  hc3_remote_id_management

Read more

JOINT CYBERSECURITY ADVISORY – PREVENTING WEB APPLICATION ACCESS CONTROL ABUSE

Click the link to access > joint_csa_preventing_web_application_access_control_abuse

Read more