Entries by

, , , ,

Ransomware Prevention and Response: Avoiding Paying Attackers

When the lights go down in the city, it might be something far more nefarious than bad weather or a simple equipment malfunction. The cause could be an attacker who has infiltrated the utility company’s defenses (or lack thereof), infected controllers, and is now holding the city ransom. Ransomware attacks have become an increasingly popular reality. Learn why it’s important to not pay a ransom to attackers.


It’s Not If, But When

Information security incidents are unavoidable. It’s important to learn how to respond effectively to and manage an incident that does occur. CEO Evan Francen breaks down the four steps your organization can and should take in order to manage an incident properly before calling in an expert. Prepare now.


What Makes a Good Chief Security Officer?

The news from Equifax on Friday (9/15) states “the Chief Information Officer and Chief Security Officer are retiring”.  Somebody’s got to pay, and here are your first two scapegoats.  Will it stop with these two, or is the CEO (Richard Smith) job at risk too?  We can only speculate. I’m more interested in answering the question; what makes a good CSO/CISO or a good information security professional/expert?

Simplify. Formalize. Automate. Measure.

Life as a security professional is sometimes difficult, wouldn’t you agree?  Most of us are damn good at our jobs, and have the best intentions, only to feel lost in the constant barrage of inputs like emails, threat alerts, spreadsheets, reports, questions from executives, questions from users, etc.  Some days, something has to give.  I […]


Five Things Every CISO Must Do

OK there aren’t only five things every CISO needs to do, but you better at least get these five right! #1 – CISO’s Must Master the basics. It’s a great pleasure to talk with CISOs and other information security experts every day in my job.  If it’s my first time meeting you (in the correct […]