INTEGRATING ENTERPRISE SECURITY CONTROLS INTO THE BROWSER

4.24.23 > Matt Hoyland for Island “Sometimes changing one thing changes everything.  The Browser is the Enterprises most used application, but Browser’s traditional focus has been for Advertisements and Content Delivery.  Our friends at Island reimagine the Browser to give Enterprises full control of their data and how it interacts with other applications.  The TAG Cyber team recently took […]

Read more

“COMING HOME TO A PLACE HE’D NEVER BEEN BEFORE…”

4.19.23 > Tony Sager I just checked – my first connection to the Minnesota Cyber Summit was in 2016 as a speaker.   In fact, I think it was the first time I had ever set foot in the State of Minnesota. How the cyber-time flies (even if progress feels glacial!)   I forget the details, but […]

Read more

RISK MANAGEMENT AND SECURITY BY DESIGN: A NECESSARY INTERSECTION

4.17.23 > Milinda Rambel Stone Imagine. Imagine an organization that has visibility into its cybersecurity risks and actively makes sustainable, risk-based business decisions that are measurable and quantifiable. This idea is one that must be created. As an information security community, we need to drive this change for continued business and operational relevance. Design. We […]

Read more

GROWING IMPORTANCE OF SECURITY THIRD-PARTY RISK MANAGEMENT ON SUPPLY CHAIN MANAGEMENT

4.12.23 > Michelle Greeley As outsourced business models continue to rise in popularity, cybersecurity threats facing organization supply chains are growing unprecedentedly, requiring stringent third-party risk mitigation and the utmost awareness of management teams alike. Throughout 2022, companies spent over $700 billion on establishing or expanding outsource capabilities. Breaking this down by segment, IT outsource […]

Read more

REGULATORS: THE COMPLIANCE BAR – AND COSTS – KEEP RISING

4.10.23 > Chris Buse Chief Information Security Officers (CISOs) face a daunting challenge: keeping abreast of and demonstrating compliance with constantly changing compliance requirements. CISOs frequently use the term “compliance bar”, which implies that there is single set of regulatory guidance to pick up and read. That is not the case. A significant challenge is […]

Read more

BUILDING RESILIENCY

4.5.23 > Gregory Ogdahl In today’s digital age, cyber threats are becoming increasingly sophisticated and frequent. Organizations must take a proactive approach to safeguard their data, systems, and networks against cyberattacks. A resilient, highly trained, and ready cyberspace operations and intelligence team is essential to achieve this objective. Building such a team requires a combination […]

Read more

YOU SHOULD HAVE A 18 CHARACTER PASSCODE

4.3.23 > David La Belle The internet was “officially” introduced to the public in 1993. Since then, the integration into society —along with the size, scope, and complexity of the systems — has been parabolic. And while the sophistication and abilities of the tools we use to protect our infrastructure have increased, the challenges we […]

Read more

WHERE TO FIND WHAT TO POST, FOR WHOM AND WHY

3.29.23 > Paul Veeneman Occasionally I am asked, “How do you decide what to post on social media?” First, it was a learning experience, and second, posts, articles, or other submission of content always start by asking myself, “Is this relevant, informative, of value, and would I take 2 minutes out of my day to […]

Read more

IT’S TIME TO CYBER EDUCATE YOUNG PEOPLE

  3.27.23 > Shawn Riley Can you name a job that does not use computer technology today? There are a few, but very, very few.  The near ubiquitous usage of internet connected computer technology has blown the cyber challenges of today up hundreds-fold from only a couple decades ago.  While this amazing growth in technology […]

Read more

THE THREE LEVELS OF THE INTERNET

3.22.23 > Mary Frantz We are a global economy, and the internet has been a driving force in creating that economy.  The internet is a vast information exchange environment that in the last three decades has grown exponentially from government- and business- focused usage to become a household necessity. Internet usage spans the entire socio-economic […]

Read more

SEARCHING OUR GALAXY FOR A NEW SECURITY APPROACH

3.15.23 > Loren Dealy Mahler As infosec leaders, we have a responsibility for securing our organizations, but we know that despite whatever mandate comes from the top, achieving 100% security is a pipe dream. We stress ourselves out searching for the silver bullet that will protect us from anything and everything, and we wear ourselves […]

Read more