Red Teaming Course Now Offered by Watermark Institute

Amy E. Hutchens, CCEP, General Counsel, Vice President Compliance & Ethics Services at Watermark Risk Management International, LLC – and a contributing writer to this website -- has brought our staff’s attention to a valuable disaster preparedness resource stemming from the recent launching of “Red Teaming” courses now offered by the Watermark Institute led by its director, Dr. Mark Mateski. Red Teaming According to the “Red Team Journal” publication, red teaming is the practice of viewing a problem from an adversarial, competitive, or contrarian point of view. Red teams seek to … [Read more...]

Mobile Device Threats in Corporate Environments are Real and Costly

While few risk management teams would fail to recognize the growing potential for information security threats involved in mobile devices, the fact remains that a lack of integrated mobile security is continuing to cost companies in terms of everything from lost productivity to lost data. Cyber criminals also continue to target mobile workers as easy potential access portals to a company’s backend IT infrastructure. As a result, many organizational security risk management teams can argue that their company might need to supplement its integrated mobile defense program with a coherent … [Read more...]

Security Industry — New ASIS Report Assesses the State of the U.S. Security Industry

By: Ben J. Carnevale, Managing Editor An increasingly challenging security (physical and IT) related threat environment for U.S. businesses remains a major topic for all security management team in companies throughout the country. And, without a successful ability to align senior management strategic thinking with those threats still too often leaves those team under-funded and without the critical support needed for achieving their objectives. To shed some light on this critical issue and perhaps give some needed information to help in security management team presentations to upper … [Read more...]

Free Cyber Security Awareness and Training Courses Offered by DHS/FEMA Partnership with Texas A&M University.

Just recently, our staff was made aware of a program offering free cyber security related training and awareness courses.  These courses are funded by DHS/FEMA in cooperation with the Texas A&M Engineering Extension Service (TEEX). The objective of this DHS/FEMA partnering is to ensure that cyber space is supported by secure and resilient infrastructure(s) ---delivering open communications, information and prosperity while protecting privacy and confidentiality. These courses are offered at no cost and students can earn a TEEX certification of completion and Continuing Education … [Read more...]

IT Security Threats and Attacks Quantified by New Ponemon Institute Report

A newly recently report, entitled “First Annual Cost of Failed Trust Report: Threats and Attacks”, has just been released.  This report presents research from the Ponemon Institute and was underwritten by Venafi.  The objective of this report is to provide the first extensive examination of how failure to control trust (in IT security keys and certificates) in the face of new and evolving threats is placing all global enterprises at risk. Every business and government relies on cryptographic keys and certificates to provide trust for critical electronic communications.  These technologies … [Read more...]

Wireless Network Security Tested in a Unique Way

Wireless network security levels were tested recently in Edinburgh Scotland by a cyclist who “war-biked” around the capital trying to find unsecured wireless networks which could be exploited by hackers. Security expert James Lyne utilized a bike equipped with dynamos and solar panels to power a computer which scans for wireless networks which have no or poor security. As our readers well know, hackers can join wireless networks and then become totally capable of directly attacking those computers and other devices to steal money or information. They can also track which websites you … [Read more...]

E-Discovery Newsletter of Notable Cases and Events

In its ongoing effort to provide current and relevant updates regarding developments in the field of e-discovery, our staff would like to recommend a reading of the Sidley Austin LLP firm's current newsletter written by its in-house “E-Discovery Task Force” group. This group from Sidley Austin LLP works to stay abreast of the shifting legal landscape surrounding e-discovery. The most current update addresses the following recent developments and court decisions involving e-discovery issues: 1. A Northern District of Illinois ruling sanctioning a defendant company for failing to … [Read more...]

NIST Offers Free Download of SP 800-53, Rev 4

The National Institute of Standards and Technology (NIST) has now made available the Final Release of SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations – representing the most comprehensive update to the security controls catalog since its inception in 2005. This update was motivated primarily by the expanding occurrences of cyber security threats – looking at the increased sophistication of those cyber-attacks; the growing frequency of such attacks; the professionalism of the attackers, and the persistence of targeting by … [Read more...]

Online Privacy Rights Remain Under Attack and Unresolved Issues for Many in 2013

In a recent article, posted by PC World and written by Melissa Riofrio, the topic of online privacy for individuals was addressed in the light of growing threats to that privacy predicted for 2013. And, while a debate may exist about the meaning of privacy between different generations of individuals, the fact is that the data any individual generates on the internet is still a rich trove of information that says more about you than you may realize --- not to mention that it is also a tempting target for marketers and law enforcement officials alike. This year, your online privacy faces … [Read more...]

E-Discovery Predicted to be Business-Critical Operation in 2013

The topic of e-discovery continues to become an important area of enterprise risk management focus and is an area which our staff continues to monitor.  It is with that thought in mind, that brought our staff to recommend a recent posting by Aiith Samuel. Samuel's posting addresses trends and predictions for 2013 in which Samuel summarizes, “…e-discovery practices in 2013 will now involve other critical functions, including information governance, records management, social media and cyber-security, just to name a few.” Of the many postings reviewed regarding e-Discovery trends or … [Read more...]