PLAY PODCASTS
SMB Tech & Cyber Newsletter | CPF Coaching

SMB Tech & Cyber Newsletter | CPF Coaching

120 episodes — Page 2 of 3

The Business Value of PKI Encryption for SMBs: Enhancing Security and Compliance

With a digital and cloud-first approach used by Small and medium-sized businesses (SMBs), they face ever-increasing cybersecurity threats. As a cybersecurity leader, it is crucial to implement robust security measures that protect your organization and align with industry standards like the NIST Cybersecurity Framework (CSF). One such measure is Public Key Infrastructure (PKI) encryption. PKI is a framework that uses cryptographic keys to secure communications, authenticate users, and ensure data integrity. This blog post will delve into PKI encryption's purpose and business value, how it can help identify and detect potential threats, and how these steps align with the NIST CSF framework.Cybersecurity Leadership & SMB Security Development is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.How PKI Encryption Can Help SMBs Detect Threats and Align with NIST CSFAs we navigate the complexities of cybersecurity, it's essential to understand that PKI is not just a technical solution but a strategic asset that can significantly enhance your business's security posture and operational efficiency.Using PKI Encryption in SMBsIn an era where data breaches and cyber attacks are becoming increasingly common, PKI encryption is a powerful tool in the SMB's cybersecurity arsenal. By implementing PKI, businesses can create a secure environment protecting sensitive information and fostering stakeholder trust and confidence. Let's explore the key benefits that make PKI encryption invaluable for SMBs.Enhancing Security and Trust: PKI encryption provides a high level of security by encrypting data and ensuring that only authorized parties can access it. This is particularly important for SMBs that handle sensitive customer information, financial data, or intellectual property. By implementing PKI, businesses can build trust with their clients and partners, knowing their data is protected against unauthorized access.Authentication and Access Control: PKI enables robust authentication mechanisms, such as digital certificates, which verify the identity of users and devices. This helps prevent unauthorized access to critical systems and data. For SMBs, this means a reduced risk of data breaches and insider threats, leading to a more secure business environment.Compliance and Regulatory Requirements: Many industries have stringent compliance requirements regarding data security and privacy. PKI helps SMBs meet these requirements by providing a robust framework for securing communications and data. This ensures compliance and reduces the risk of legal and financial penalties associated with data breaches.PKI Tasks in your Day-to-Day and Their ValueUnderstanding the practical applications of PKI is crucial for SMB leaders to appreciate its value entirely. PKI isn't just a theoretical concept; it has tangible, real-world applications that can significantly improve your business's security and operational efficiency. Let's examine some critical PKI tasks and how they translate into concrete benefits for your organization.Digital Signatures: Implementing digital signatures for documents and transactions ensures data integrity and non-repudiation. This means that any changes to the document can be detected, and the sender cannot deny having sent the document. For SMBs, this is invaluable in maintaining the authenticity of contracts, invoices, and other critical business documents.Secure Email Communication: PKI can encrypt email communications, ensuring that sensitive information is only accessible to the intended recipient. This is particularly important for SMBs that frequently communicate confidential information with clients and partners.SSL/TLS Certificates: Using SSL/TLS certificates to secure websites and online services helps protect against man-in-the-middle attacks and ensures that data transmitted between the user and the server is encrypted. This protects customer data and enhances the business's reputation by providing a secure online experience.Current Environmental Challenges for SMBs and Some Potential SolutionsWhile the benefits of PKI are clear, implementing and maintaining this infrastructure is not without its challenges. Many SMBs face hurdles that can seem daunting at first glance. However, with the right approach and understanding, these obstacles can be overcome, allowing businesses to reap the full benefits of PKI. Let's explore some of the common challenges and their solutions.Complexity and Cost: One of the main challenges SMBs face when implementing PKI is its perceived complexity and cost. To overcome this, businesses can leverage managed PKI services that offer scalable solutions without the need for extensive in-house expertise. These services provide the necessary infrastructure and support, making PKI implementation more accessible and cost-effective.Integration with Existing Systems: Integrating PKI with existing IT systems and applica

Aug 5, 202412 min

Empowering Small and Medium-Sized Businesses to Detect and Prevent Cyber Threats

Discover how Encryption & SSL can strengthen your SMB's cybersecurity posture, align with NIST CSF, and protect against emerging threats. Learn actionable steps to implement these vital security measures.Cybersecurity Leadership & SMB Security Development is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.Encryption & SSL: Cornerstones of SMB Cybersecurity and NIST CSF AlignmentIn today's digital landscape, small and medium-sized businesses (SMBs) face an ever-growing array of cyber threats. As a seasoned cybersecurity advisor, I've witnessed firsthand the devastating impact of data breaches and cyber attacks on businesses that were caught unprepared. That's why I'm passionate about empowering SMB leaders and their security teams with the knowledge and tools they need to protect their digital assets effectively.One of the most crucial aspects of a robust cybersecurity strategy is the implementation of strong encryption and Secure Sockets Layer (SSL) protocols. These technologies safeguard your sensitive data and play a pivotal role in aligning your security practices with the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). In this post, we'll explore the business value of focusing on encryption and SSL and how these measures can significantly enhance your ability to identify and detect potential threats.The Business Value of Encryption and SSL for SMBsEncryption and SSL are not just technical jargon; they're powerful tools that provide tangible benefits to your business. By implementing these security measures, you're taking proactive steps to protect your company's most valuable assets: its data and reputation.Encryption ensures that your sensitive information remains confidential, even if it falls into the wrong hands. This is particularly crucial for SMBs that handle customer data, financial information, or proprietary business strategies. On the other hand, SSL creates a secure data transmission channel, protecting information as it travels across networks. Together, these technologies form a formidable defense against data breaches and unauthorized access.Aligning with NIST CSF: Identify and DetectThe NIST Cybersecurity Framework provides a comprehensive approach to managing and reducing cybersecurity risk. Two critical functions within this framework are "Identify" and "Detect," which are significantly enhanced by properly implementing encryption and SSL.In the "Identify" function, encryption and SSL help you catalog and understand the data assets that need protection. Implementing these technologies requires you to take stock of sensitive information and prioritize its security. This process aligns perfectly with the emphasis of NIST CSF's asset management and risk assessment.For the "Detect" function, SSL certificates and encryption protocols can serve as early warning systems. Unusual encryption activities or attempts to bypass SSL can indicate potential threats, allowing your security team to detect and respond to incidents quickly.Practical Implementation and ChallengesImplementing encryption and SSL across your organization may seem daunting, but it's necessary in today's threat landscape. Start by identifying your most sensitive data and prioritizing its encryption. This could include customer information, financial records, and intellectual property.For SSL, ensure that all your public-facing websites and applications use HTTPS. This protects data in transit and boosts your search engine rankings and customer trust.One common challenge SMBs face is the misconception that robust encryption is too complex or expensive to implement. However, with the proper guidance and tools, even small businesses can achieve high security. Cloud-based solutions and managed security services have made enterprise-grade encryption more accessible.Another hurdle is keeping up with evolving encryption standards and SSL certificate management. Regular audits and updates are crucial to maintain the effectiveness of your security measures. Consider automating certificate renewals and implementing a centralized management system to streamline this process.Future-Proofing Your Encryption StrategyAs we look to the future, the importance of encryption and SSL will only grow. Quantum computing poses both a threat and an opportunity in encryption. While it can potentially break current encryption methods, it also paves the way for quantum-resistant algorithms.To stay ahead of the curve, SMBs should monitor post-quantum cryptography developments. The National Institute of Standards and Technology (NIST) is already working on standardizing quantum-resistant cryptographic algorithms. Familiarizing yourself with these emerging standards can help you prepare for the future of data protection.Additionally, consider exploring homomorphic encryption, which allows computations on encrypted data without decrypting it first. This te

Jul 29, 20245 min

Lessons from Crowdstrike/Windows Cyber Outage: Key Takeaways for Robust Cybersecurity

Discover essential takeaways from yesterday’s cyber outage, including understanding digital supply chain risks, implementing robust change management, and developing a comprehensive incident response plan. Enhance your cybersecurity resilience today.Cybersecurity Leadership & SMB Security Development is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.Lessons from Yesterday’s Cyber Outage: Key Takeaways for Robust CybersecurityCyber (or IT) outages can have devastating impacts on businesses, causing not only financial losses but also reputational damage. Yesterday's cyber outage was a stark reminder of the vulnerabilities that lurk within our interconnected systems. As organizations rely increasingly on digital technologies, understanding and mitigating these risks becomes paramount. Reflecting on the recent incident, several critical lessons have emerged that can help organizations fortify their defenses and enhance their incident response strategies. These takeaways highlight the importance of a comprehensive approach to cybersecurity, emphasizing the need for thorough risk assessment, robust change management, and an inclusive incident response plan. 1. Understand the Risks in Your Digital Supply ChainOne of the most crucial aspects of maintaining a secure digital environment is understanding the risks inherent in your digital supply chain or software development life cycle (SDLC). The cyber outage underscored the importance of thoroughly testing changes before large-scale deployments into production. This proactive approach identifies and mitigates potential vulnerabilities early, preventing disruptions and security breaches.* Risk Assessment: Regularly conduct risk assessments to identify and evaluate potential threats within your digital supply chain and SDLC. This includes understanding third-party dependencies and their associated risks.* Testing and Validation: Implement rigorous testing protocols, including penetration testing and vulnerability assessments, to validate changes before deployment. This helps in detecting flaws that cyber attackers could exploit.* Continuous Monitoring: Establish constant monitoring systems to monitor changes and their environmental impacts. This enables real-time detection of anomalies and swift action to mitigate risks.2. Implement a Robust Change Management ProcessA robust change management process is essential for handling unforeseen issues during deployments. The recent outage demonstrated the importance of being prepared to roll back changes that do not go as expected and responding effectively to minimize disruption.* Change Control: Develop a structured change control process that includes detailed documentation, approval workflows, and rollback procedures. This ensures that all changes are tracked and can be reversed if necessary.* Rollback Plans: Prepare rollback plans for every deployment. These plans should be tested regularly to ensure smooth execution in case of an unexpected issue.* Responsive Actions: Train your team to respond quickly and efficiently to unforeseen changes. This includes having a clear communication plan to inform stakeholders about the status and impact of the change.3. Develop a Comprehensive Incident Response PlanHaving an incident response plan that encompasses the entire business is vital. Cyber incidents can affect various aspects of operations, IT, cybersecurity, development, and other business functions. An inclusive incident response plan ensures that everyone knows their role and can contribute to a coordinated response.* Holistic Planning: Create an incident response plan that involves all business functions. Ensure that all team members clearly define and understand roles and responsibilities.* Decision Trees: Develop decision trees to guide actions during different incidents. This helps make informed decisions quickly, even when the nature of the incident is unclear.* Regular Drills: Conduct incident response drills to ensure all team members are prepared to act swiftly and effectively. These drills should simulate malicious and non-malicious incidents to cover all potential scenarios.Thank you for reading Cybersecurity Leadership & SMB Security Development. If you love the content of this post, we would love it if you shared it with others.ConclusionYesterday’s cyber outage powerfully reminds us of the importance of robust cybersecurity practices. By understanding and mitigating risks in your digital supply chain, implementing a solid change management process, and developing a comprehensive incident response plan, organizations can significantly enhance their resilience against cyber threats. Proactive preparation and continuous improvement are vital in maintaining a secure and reliable digital environment.Product of the Week: Nessus from TenableSecure Cloud Infrastructure Before Deployment The reliance on the cloud and infrastructure as code (IaC) to

Jul 20, 20246 min

Enhancing SMB Security: The Critical Role of Desktop Protection

In today's digital age, small and medium-sized businesses (SMBs) face increasing threats from cyber attacks, which can compromise sensitive data and disrupt operations. Desktop security, often overlooked, plays a crucial role in defending against these threats. For SMB leaders, focusing on desktop security not only helps in identifying and detecting potential threats but also aligns with the NIST Cybersecurity Framework (CSF) to enhance overall security posture.Cybersecurity Leadership & SMB Security Development is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.Desktop security involves protecting endpoint devices such as computers, laptops, and workstations from cyber threats. Given that these devices are gateways to the organization's network, ensuring their security is paramount. By integrating desktop security measures with the NIST CSF, SMBs can create a robust defense mechanism that supports their business objectives and regulatory compliance requirements.Tasks and Their Business ValueImplementing desktop security involves several critical tasks that offer substantial value to the organization.* Endpoint Protection Solutions: Deploying antivirus and anti-malware software is the first line of defense against cyber threats. These solutions help detect and eliminate malicious software, protecting sensitive business data and maintaining operational continuity.* Patch Management: Regularly updating software and operating systems on desktops ensures that known vulnerabilities are patched. This reduces the risk of exploitation by cybercriminals and minimizes potential security breaches.* Access Control: Implementing strict access controls, such as multi-factor authentication (MFA) and role-based access, ensures that only authorized personnel can access critical systems and data. This helps prevent unauthorized access and potential data breaches.These tasks align with the NIST CSF’s core functions: Identify, Protect, Detect, Respond, and Recover. By addressing these areas, SMBs can systematically enhance their security posture, making it harder for attackers to compromise their systems.Current Environmental ChallengesSMBs often face unique challenges in implementing effective desktop security. Limited budgets and resources can make it difficult to invest in advanced security solutions. Additionally, the lack of dedicated IT security staff means that many SMBs do not have the expertise needed to manage and respond to security threats effectively.To overcome these challenges, SMBs can leverage cost-effective solutions such as cloud-based security services, which offer robust protection without the need for significant upfront investment. Training employees on basic cybersecurity practices can also enhance the overall security posture by reducing the likelihood of human error leading to security incidents.Optimizing Desktop Security with Future SolutionsLooking ahead, SMBs can optimize desktop security by adopting innovative technologies and practices.* Behavioral Analytics: Implementing tools that use machine learning to analyze user behavior can help detect anomalies and potential threats in real-time, providing an additional layer of security.* Zero Trust Architecture: Moving towards a zero trust model, where every access request is authenticated, authorized, and encrypted, ensures that even if a device is compromised, the risk of further exploitation is minimized.* Automation: Using automated tools for patch management, threat detection, and response can significantly reduce the burden on IT staff and ensure that security measures are consistently applied.By staying abreast of these advancements, SMBs can continuously improve their desktop security measures, aligning them with the evolving threat landscape and maintaining compliance with the NIST CSF.SummaryIn conclusion, focusing on desktop security is vital for SMB leaders to protect their organizations from potential cyber threats. By implementing endpoint protection solutions, managing patches effectively, and enforcing strict access controls, SMBs can align their security efforts with the NIST CSF. Overcoming challenges such as limited resources and expertise can be achieved through cost-effective solutions and employee training. Looking to the future, adopting behavioral analytics, zero trust architecture, and automation will help optimize desktop security, ensuring a robust defense against evolving cyber threats.Action Items:* Assess current desktop security measures and identify gaps.* Implement endpoint protection solutions and ensure regular patch management.* Enforce strict access controls and consider adopting MFA.* Train employees on basic cybersecurity practices.* Explore and adopt advanced security technologies like behavioral analytics and zero-trust architecture.Thank you for reading Cybersecurity Leadership & SMB Security Development . If you enjoyed this post, please sh

Jul 12, 20244 min

Maximize Business Security: The Critical Purpose and Value of DDoS Protection

Learn how DDoS protection can safeguard your business by aligning with the Identify and Protect stages of the NIST Cybersecurity Framework. Discover practical strategies and future solutions for SMBs. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jun 28, 20248 min

The Framework Foundation of NIST CSF as Risk Management for CISO & Practitioners

Understanding and Implementing the NIST Cybersecurity Framework (CSF): A Guide for CISOs and PractitionersIn this episode of the Cyber Hub podcast, James Azar and Chris Filone discuss the practical application of the NIST Cybersecurity Framework (CSF) for organizational risk management. They delve into the framework's components, such as Identify, Protect, Detect, Respond, and Recover, and provide insights on how these can be tailored to suit the specific needs of any organization. The discussion emphasizes the importance of integrating privacy considerations and continuously monitoring and updating security measures to adapt to evolving threats and regulatory requirements.Actionable Takeaways:* Understand the NIST CSF Structure: Familiarize yourself with the framework’s components and their application.* Perform a Gap Analysis: Identify gaps in your organization’s cybersecurity posture using the NIST CSF.* Implement Relevant Controls: Select and apply controls that align with your organization’s risk profile.* Integrate Privacy Considerations: Ensure privacy requirements are part of your cybersecurity strategy.* Continuous Monitoring and Improvement: Establish ongoing monitoring processes and regularly update security measures.Referenced links:The NIST Cybersecurity Framework (CSF) 2.0 (This is for the publication and links to many other resources)Cybersecurity Framework (CSF) - NIST CSWP 29 (This is the NICSF CSF Framework webpage) Navigating NIST's CSF 2.0 Quick Start Guides (Business and Community profile recommendations available here)NIST Cybersecurity Framework (CSF) 2.0 Reference Tool (Exportable in Excel and JSON) This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

May 24, 202432 min

Friday Conversation: Cybersecurity Frameworks Explained CIS, NIST, MITRE & More

Join James Azar and Chris Foulon on Friday Conversations podcast to unravel the complexities of cybersecurity frameworks like CIS, NIST, and MITRE. Learn their differences, practical applications, and how they impact cybersecurity strategies. Tune in for expert insights and actionable advice. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

May 23, 202428 min

Enhancing Business Security Through Identity Management in the NIST Cybersecurity Framework

Harnessing the Identify and Protect Stages of NIST CSF for Enhanced Threat ProtectionExplore how identity management is pivotal in the Identify and Protect stages of the NIST Cybersecurity Framework (CSF), offering robust defenses against evolving cyber threats.In today's digital-first environment, managing internal identities efficiently and securely is paramount for organizations across all industries. Identity management encompasses the methodologies and systems that allow businesses to authenticate and authorize individuals or groups to access resources within corporate environments. However, this process comes with complex challenges that can impact security, compliance, and operational efficiency. Understanding these challenges and employing strategic improvements is crucial for maintaining robust security protocols and safeguarding sensitive information. This introduction delves into organizations' everyday challenges in managing internal identities and provides practical tips for enhancing these processes. Additionally, it highlights the critical role of collaboration among various business units, such as Human Resources, IT, Compliance, and departmental management, in fostering a secure and compliant identity management framework.Introduction to Identity Management and the NIST Cybersecurity FrameworkIdentity management is critical to any organization’s cybersecurity strategy, particularly within the Identify and Protect stages of the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF). This framework provides guidelines on preventing, detecting, and responding to cyber threats, with identity management as a cornerstone for safeguarding digital assets. It involves processes and technologies that help manage and secure identity information to ensure the right individuals access the appropriate resources at the right times for the right reasons.The Value and Impact of Identity Management TasksEffective identity management encompasses various tasks, each contributing uniquely to the organization's security posture. Key tasks include creating and managing user credentials, implementing multi-factor authentication (MFA), and continuously monitoring and updating access controls. These measures help reduce the risk of unauthorized access and potential breaches. For example, MFA adds layer of security that significantly mitigates the risk of compromised passwords.Challenges and Solutions in the Current EnvironmentToday’s businesses face numerous challenges in identity management, including managing access across varied IT environments and the growing sophistication of cyber threats. Organizations are increasingly turning to cloud-based identity and access management solutions that offer scalability, real-time access updates, and integrated security features to address these issues. Additionally, adopting artificial intelligence and machine learning for behavioral analysis can predict and prevent unauthorized access based on usage patterns.Looking Forward: Innovations and Strategies in Identity ManagementLooking ahead, the future of identity management is geared towards more integrated and predictive systems. Innovations such as blockchain for secure, decentralized management of digital identities and biometric authentication methods are on the rise. These technologies not only enhance security but also improve user experience by streamlining authentication processes.Actionable SummaryTo fully leverage identity management within the Identify and Protect stages of the NIST CSF, organizations should:* Evaluate and update their identity management policies regularly.* Invest in training for IT staff and users to recognize phishing attempts and other common cyber threats.* Consider adopting emerging technologies like blockchain and advanced biometrics to stay ahead of potential security threats.For further learning and detailed understanding, professionals are encouraged to consult resources such as NIST’s official guidelines on identity management and participate in cybersecurity forums and webinars.Challenges of Internal Identity Management* The complexity of Managing Diverse User Roles: Organizations often struggle with the complexity involved in managing diverse user roles and access rights. As companies grow and roles change, keeping track of who has access to what becomes increasingly challenging.* Integration Across Multiple Platforms: Many businesses use various applications and platforms, each with its own identity management controls. Integrating these systems without creating security gaps or user friction is a significant challenge.* Compliance and Regulatory Requirements: Adhering to regulatory requirements for data access and protection, such as GDPR or HIPAA, adds another layer of complexity to identity management. Compliance requires meticulous control and auditing of access rights.* Insider Threats: Managing the risk posed by insider threats is a continuous chall

May 5, 202411 min

Mastering Shadow IT: Strategies for Integrating Unsanctioned Tech into Your Golden Road Develop

Explore practical strategies to manage and integrate shadow IT into your secured development processes, enhancing security and compliance without stifling innovation. Learn how MSSPs and security consultants can help your business transform shadow IT challenges into assets for growth and security.See post for more detailed write up:https://substack.cpf-coaching.com/p/mastering-shadow-it-strategies This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

May 1, 202417 min

The Pillars of Zero Trust, Trust but Verify feat Chris Foulon & James Azar

Join us live on Fridays at 11 am EST and ask your questions live. If you like a topic covered, send it over to us. The concept of "Trust but verify" within the realm of "Zero Trust" security frameworks is quite intriguing, as it merges a traditional approach to security with a more contemporary, stringent model.Originally, "Trust but verify" was a security principle that emphasized the need for continuous validation. In practice, this means that while organizations might initially trust users or systems, they must consistently verify their credentials and permissions to maintain security. This approach recognizes that trust is essential but must be accompanied by ongoing scrutiny to be effective.On the other hand, "Zero Trust" is a security model based on the philosophy of "never trust, always verify." This model assumes that threats could be internal or external, requiring strict identity verification, strict access controls, and network segmentation to minimize risks. Zero Trust does not inherently trust any entity inside or outside its perimeters at the outset; instead, it demands continuous validation of every request as if it originates from an untrusted source.When we discuss blending "Trust but verify" with "Zero Trust," we look at a nuanced approach that applies rigorous and continuous verification processes in every interaction within an IT environment, regardless of the origin's assumed trustworthiness. This integration helps businesses protect sensitive data and systems by enforcing strict access controls while ensuring that every action is subject to security checks, reducing potential breaches and enhancing overall security posture.For businesses, adopting a "Trust but verify" stance within a zero-trust framework means securing their networks and data more effectively and fostering a culture of security that aligns with dynamic business environments and evolving threat landscapes. This approach ensures that security measures are robust, scalable, and capable of supporting immediate operational needs and long-term strategic goals.When practitioners focus on the "Trust but Verify" pillar within a Zero Trust framework, they should be vigilant about several key aspects that ensure this principle is effectively implemented to safeguard their organization's IT environment. Here are some essential points of concern:* Continuous Verification: Continuous verification is at the heart of the "Trust but Verify" approach. Practitioners need to ensure that verification processes are not just a one-time event but ongoing. This includes re-authenticating users and re-validating their access rights on a regular basis or dynamically based on context, such as changes in user behavior or risk level.* Multi-Factor Authentication (MFA): Implementing MFA is crucial. This security measure adds an extra layer of protection by requiring two or more credentials to verify a user’s identity. Practitioners should ensure these authentication factors are robust and diverse (something you know, something you have, and something you are).* Least Privilege Access Control: Access rights should be tightly controlled and restricted based on the principle of least privilege. This means users are granted only the access necessary to perform their job functions. Practitioners must regularly review and adjust these permissions to adapt to changes in roles and responsibilities.* Audit and Log Review: Regular audits and log reviews are critical for detecting and responding to anomalies and potential security threats. Practitioners should implement automated tools to help monitor and analyze activity logs for unusual actions that could indicate a breach or security risk.* Endpoint Security: With numerous devices accessing the network, securing these endpoints is vital. Practitioners should ensure that all devices are regularly updated, monitored for compliance with security policies, and scanned for vulnerabilities.* Encryption and Data Security: Data should be encrypted at rest and in transit to protect it from unauthorized access. Practitioners must enforce strong encryption standards and regularly update cryptographic keys and protocols to guard against emerging threats.* Segmentation of Network: Network segmentation divides the network into smaller, manageable segments, which can limit the spread of breaches within systems. Practitioners should ensure that these segments are properly secured and that their interactions are monitored to prevent attackers' lateral movement.* User Education and Awareness: Human error often leads to security breaches. Practitioners should invest in regular training programs to keep users aware of security best practices and the latest phishing tactics, thereby reducing the risk of security lapses.* Adaptive Security Policies: Security policies should be adaptable based on context and risk. This includes adjusting access controls based on the user's location, device security posture, and network threats.By

Apr 19, 202430 min

The Pillars of Zero Trust_ Assuming Breach feat Chris Foulon & James Azar

The "Assume Breach" pillar of the Zero Trust model is grounded in the understanding that security breaches are not just possible; they are inevitable. This pragmatic approach dictates that organizations should plan and build their security architectures as if the attackers are already inside their network. Here’s a detailed exploration of the critical strategies under this pillar: 1. Detect and RespondUnder the assumption of a breach, detection, and response capabilities are designed to identify and mitigate threats swiftly before they can cause significant damage. This includes:- Intrusion Detection Systems (IDS): monitor network traffic for suspicious activities and known threats, signaling alerts when potential security breaches are detected.- Security Information and Event Management (SIEM) Systems: SIEM systems collect and aggregate logs from various sources within the network, applying analytics to detect patterns or anomalies that might indicate malicious activity.- Automated Response Solutions: Upon detecting a threat, automated systems can respond immediately by isolating affected segments, blocking malicious communications, or terminating harmful processes, thereby reducing the window of opportunity for attackers to exploit.2. Limit Lateral MovementOnce an attacker gains access to a part of the network, their next goal is often to move laterally to reach valuable data or systems. Strategies to limit this movement include:- Network Segmentation: Dividing the network into smaller, isolated segments or zones can control how traffic moves across the network and limit access to critical assets. Firewalls and access control lists (ACLs) enforce these boundaries by controlling traffic flow based on security policies.- Application Segmentation: Beyond network segmentation, application-level segmentation can further restrict access to applications based on user identity and context, limiting an attacker’s ability to access sensitive applications.- User and Entity Behavior Analytics (UEBA): This technology uses machine learning to understand normal user behavior and can detect deviations that suggest malicious activity, such as an unauthorized attempt to access data. 3. Enhance MonitoringComprehensive monitoring is essential for detecting unusual activities that may indicate a breach. Enhanced monitoring techniques include:- Log Management: Collecting and analyzing logs from all devices and applications across the network provides visibility into activities and potential security incidents.- Endpoint Detection and Response (EDR): EDR tools are deployed on endpoints to monitor and collect data about potentially malicious activities, which can be used to identify and respond to threats.Continuous Monitoring: Continuous monitoring involves the ongoing analysis of security controls and user activities, ensuring that any deviations from the norm can be detected and responded to in real-time.The "Assume Breach" approach shifts the security strategy from merely trying to prevent perimeter attacks to actively managing network security, acknowledging that perfect perimeter defense is unachievable. This mindset encourages continuous improvement of internal controls and rapid response strategies, ultimately strengthening the organization’s resilience against attacks. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Apr 12, 202429 min

Podcast - Mastering Vulnerability Management: The Power of Prioritization with EPSS

Discover how EPSS transforms vulnerability management for business leaders, offering strategic insights into cybersecurity's most pressing challenges and future-proof solutions.Originally posted here :https://substack.cpf-coaching.com/p/mastering-vulnerability-management-e45 This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Apr 10, 20244 min

Understanding Container Security: Essential Insights for Business Leaders

Audio Version | Discover the critical role of container security in managing vulnerabilities and shaping the future of cybersecurity for business leaders. Gain actionable insights and explore forward-thinking solutions in our guide.Originally posted here: https://substack.cpf-coaching.com/p/understanding-container-security This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Apr 5, 20242 min

Two CISOs Talking Cyber Podcast - Zero Trust Security: Least Privilege

Two CISOs Talking Cyber Podcast - Zero Trust Security: Least PrivilegeJames Azar and I discussed the first tenet of Zero Trust Architecture in today’s podcast. I will include additional resources and references for those looking to go deeper down the Rabbit Hole.Previous blogs on the topic from me:NIST SP 800-207 https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdfSummary:Understanding the principle of Least Privilege is essential for enhancing cybersecurity within an organization. Here's a breakdown of the minimum pros, cons, opportunities, and challenges associated with its use:Pros:* Enhanced Security: By limiting access rights for users to the bare minimum necessary to perform their tasks, the principle of Least Privilege reduces the potential attack surface for cybercriminals.* Reduced Insider Threats: It minimizes the risk of insider threats, whether intentional or accidental, by restricting access to sensitive information and critical systems.* Easier Compliance: Helps organizations comply with regulatory standards and privacy laws by demonstrating that access controls are in place and that data exposure is minimized.Cons:* Implementation Complexity: Setting up Least Privilege access can be complex and time-consuming, requiring a detailed understanding of every user's role and responsibilities.* Potential Productivity Impact: If not managed properly, it could lead to situations where employees are unable to access necessary resources promptly, affecting productivity.* Ongoing Management: Requires continuous monitoring and adjustment as roles change within an organization, adding to administrative overhead.Opportunities:* Improved Security Posture: Implementing Least Privilege can significantly enhance an organization's overall security posture, making it more resilient to attacks.* Cost Savings: By reducing the risk of data breaches, organizations can save on the costs associated with cyber incidents, including fines, remediation efforts, and reputational damage.* Adaptability to Cloud Environments: As more organizations move to cloud-based services, Least Privilege can be efficiently implemented to manage access in these dynamic environments.Challenges:* Determining Access Levels: Accurately defining the access levels required for each user or system can be challenging, especially in complex environments with many interdependent systems and applications.* Resistance from Users: Users accustomed to having broad access may resist the imposition of more restrictive controls, perceiving it as a loss of autonomy or trust.* Keeping Policies Up-to-Date: As organizations evolve, keeping access privileges aligned with current roles and responsibilities requires ongoing vigilance and effort.Incorporating Least Privilege within an organization's security framework presents a balanced set of pros and cons. While it significantly enhances security and compliance, it demands careful planning and continuous management. However, the opportunities it presents for improving an organization's security posture and reducing the risk of data breaches are compelling reasons to overcome these challenges. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Mar 22, 202427 min

Unlocking the Power of API Security for Business Success

Fortify Your Digital Frontiers: The Power of API SecurityExplore the critical role of API (Application Programming Interface) security in safeguarding your applications and business. Understand its tasks, challenges, and future solutions through our comprehensive guide designed for business leaders.Originally posted here: https://substack.cpf-coaching.com/p/unlocking-the-power-of-api-security This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Mar 21, 20242 min

Secure Your Code, Secure Your Future: The Pillar of Application Security

In an era where digital innovation is king, the integrity of application development processes has never been more critical. At the heart of this digital fortress lies Source Code Supply Chain Security, a linchpin in safeguarding our digital assets against the ever-evolving threats of the cyber world. This introductory dive explores the unseen vulnerabilities within our applications and unveils the paramount importance of securing the very DNA of our software - the source code. As we navigate the complexities of application security, understanding and implementing robust source code supply chain security measures emerge as a basic practice and a necessity in protecting our digital future. Join us as we unravel the layers of protection between your applications and potential adversaries, shedding light on the silent guardians of the digital age. Original article posted here: This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Mar 15, 20242 min

Two CISOs Talking Cyber - The Pillars of Zero Trust and Least Privilege: featuring Chris Foulon and James Azar

The conversation, hosted by James Azar on the Cyber Hub Podcast, delves into the concepts of zero trust and least privilege in cybersecurity. With contributions from speakers including Chris Foulon, they explore the multifaceted approach to access and data management within the framework of zero trust, providing insights into practical implementation and the underlying philosophy guiding these principles.Main Points:* Concept and Importance of Least Privilege: The discussion highlights least privilege as a critical aspect of cybersecurity, emphasizing its role beyond mere access management. It's portrayed as a comprehensive framework that includes access, availability, data classification, and understanding, ensuring individuals access the necessary resources and information precisely when needed, thereby enhancing security and efficiency.* Implementation Challenges and Strategies: Speakers touch upon the practical challenges of implementing least privilege, including the need for a nuanced understanding of business operations and the role of security in enabling business objectives. They discuss the importance of balancing security measures with business productivity, avoiding overly restrictive practices that may hinder operational efficiency or encourage circumvention of security protocols.* Evolution of Access Management: The conversation also covers the evolution of access management towards automation and just-in-time access, reflecting on the advancements in technology that enable more dynamic, context-sensitive, and efficient control over access rights. This approach facilitates the application of least privilege principles by granting access based on immediate need, thereby reducing the risk of excessive privileges accumulating over time.The podcast provides a deep dive into the principles of least privilege and zero trust, illustrating their significance in contemporary cybersecurity practices. It underscores the balance required between enforcing robust security measures and supporting the operational needs of a business, all while adapting to the evolving landscape of threats and technological advancements. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Mar 8, 202427 min

What do CISO’s Really think of NIST CSF 2.0 featuring Chris Foulon and James Azar Exploring NIST CSF 2.0: A Fresh Perspective on Cybersecurity Frameworks

Co-produced with James Azar - Exploring NIST CSF 2.0: A Fresh Perspective on Cybersecurity Frameworks A Dive into the Enhanced NIST Cybersecurity Framework This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Mar 1, 202429 min

Embracing Evolution: Navigating the Shift from NIST CSF 1.0 to 2.0

Introduction to NIST Cybersecurity Framework (CSF)Before exploring the changes, let's understand the NIST Cybersecurity Framework. Consider it a comprehensive guide for organizations to manage cybersecurity risks. Like a detailed map that helps you navigate an unknown city, the NIST CSF helps organizations navigate the complex landscape of cybersecurity threats and practices.Transitioning from NIST CSF 1.0 to 2.0Expanding on the specific changes introduced in NIST CSF 2.0 provides a clearer picture of how the framework has evolved to address the dynamic landscape of cybersecurity threats and the increasing importance of privacy.The changes introduced in NIST CSF 2.0 reflect a natural evolution of the framework in response to the ever-changing cybersecurity landscape. By incorporating privacy considerations, emphasizing supply chain security, clarifying language, offering customization, and aligning with other NIST publications, the updated framework aims to provide organizations with a more effective, flexible, and comprehensive tool for managing cybersecurity risks.For business stakeholders, understanding these specific changes is crucial for effectively leveraging the NIST CSF to enhance their organization's cybersecurity posture. Implementing the updated practices and principles of NIST CSF 2.0 can help organizations protect against evolving cyber threats, ensure personal data privacy, and foster a resilient and secure digital environment.Originally posted: https://substack.cpf-coaching.com/p/csf-2 This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Mar 1, 20247 min

Is Zero Trust a Buzzword or something SMBs can implement?

Imagine your business as a modern-day fortress in an era of digital warfare, where threats don't march in broad daylight but lurk in the shadows of the digital world. Traditional moats and walls (perimeter-based security) are no longer sufficient in this landscape. Enter Zero Trust is a strategy not just of defense but of intelligent, dynamic warfare against cyber threats. This blog post deciphers the principles and tenants of Zero Trust, transforming them into a blueprint for constructing an impregnable digital fortress.Cybersecurity Leadership Development Coaching | CPF Coaching is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.Originally posted: This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Feb 24, 20243 min

Zero Trust Done Right with James Azar & Christophe Foulon

Lists of books mentionedStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit https://www.amazon.com/Start-Up-Secure-Cybersecurity-Company-Founding/dp/1119700736Project Zero Trust: A Story About a Strategy for Aligning Security and the Business https://www.amazon.com/Project-Zero-Trust-Strategy-Aligning/dp/B0BG6D1J26/A Data-Driven Computer Defense: THE Computer Defense You Should Be Using https://www.amazon.com/Data-Driven-Computer-Defense-Should-Using/dp/B0BR9KS3ZF/ This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Feb 23, 202429 min

Maximizing Application Security with OSS

Discover the critical importance of inventorying open-source components in your application security program. Learn how this practice can safeguard your business from vulnerabilities and enhance your software's integrity. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Feb 20, 20243 min

Breaking into Cybersecurity Leadership Roselle Safran

Thank you for reading Cybersecurity Leadership Development Coaching | CPF Coaching. This post is public, so feel free to share it.Breaking into Cybersecurity Leadership Roselle SafranRoselle Safran on LinkedIn https://www.linkedin.com/in/rosellesafran/Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It’s a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books:Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/About the hosts:Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at magnetichiring.com/bookChristophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com* Website: https://www.cyberhubpodcast.com/breakingintocybersecurity* Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/* YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity* Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/* Twitter: https://twitter.com/BreakintoCyber* Twitch: https://www.twitch.tv/breakingintocybersecurity This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Feb 16, 202428 min

The Strategic Imperative of Application Security Integration into the SDLC and Project Delivery The Strategic Imperative of Application Security Integration into the SDLC and Project Delivery

In the dynamic realm of digital transformation, integrating application security into the Software Development Life Cycle (SDLC) and project delivery has emerged as a pivotal strategy for businesses aiming to navigate the complexities of the modern cybersecurity landscape. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Feb 12, 20243 min

Enhancing Application Security: A Deep Dive into OWASP and SANS Top 10 Training and Review

Step up your application security game! Our latest blog explores how training and reviewing with OWASP & SANS Top 10 can make a difference. #ApplicationSecurity #OWASP #SANSTop10This expanded blog post provides a more in-depth look at the significance of training and review in application security, specifically through the lens of the OWASP and SANS Top 10. It aims to educate and motivate a broad range of stakeholders to adopt these practices for enhanced security.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books: Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/_________________________________________About the hosts: Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://feeds.captivate.fm/breaking-into-cybersecurity/- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/- Twitter: https://twitter.com/BreakintoCyber- Twitch: https://www.twitch.tv/breakingintocybersecurity This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jan 26, 20243 min

Insights into the CISO MindMap - Mastering Vulnerabilities: Elevating Business Security with a Priority Focused Approach

Dive deep into vulnerability classification, and learn why a Priority Focused Approach is a game-changer for business cybersecurity in the digital era. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Sep 15, 20233 min

The Power of Identification in Continuous Vulnerability Management

Uncover the significance of identification in periodic vulnerability management. Stay updated on current challenges and future-forward solutions to safeguard your digital assets.Diving into the CISO Mindmap - A series providing increased clarity into the role of a CISOI wanted to pay homage to the work of Rafeeq Rehman and the CISO Mind Map https://rafeeqrehman.com/2023/03/25/ciso-mindmap-2023-what-do-infosec-professionals-really-do/ so with the approval of Rafeeq; I will take an overview or summary of the different areas. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Aug 28, 20234 min

Strengthening Your Armor_ A Guide to Effective Vulnerability Management

As a business leader, ensuring a secure digital environment is crucial. Our latest blog post covers the importance of vulnerability management, offering insights into identification tasks, environmental challenges, and forward-looking solutions. Stay ahead of the curve! #Cybersecurity #VulnerabilityManagement This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Aug 25, 20234 min

Unveiling Cybersecurity's Secret Weapon_ A Deep Dive into Identification in Comprehensive Vulnerability Management

The Indispensable Role of Identification in Comprehensive Vulnerability Management: In-depth Insights for Modern Business LeadersDiving into the CISO Mindmap - A series providing increased clarity into the role of a CISOI wanted to pay homage to the work of Rafeeq Rehman and the CISO Mind Map https://rafeeqrehman.com/2023/03/25/ciso-mindmap-2023-what-do-infosec-professionals-really-do/ so with the approval of Rafeeq; I will take an overview or summary of the different areas. Unearth the essential function of identification within comprehensive vulnerability management, the associated tasks, present environmental challenges, and innovative future solutions. Equip your business with practical strategies and action plans to bolster your cybersecurity preparedness.Posted: https://substack.cpf-coaching.com This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Aug 24, 20234 min

Navigating the Cyber Landscape: IoT Vulnerability Management, Challenges and Solutions

Navigating the Cyber Landscape: IoT Vulnerability Management, Challenges and SolutionsUncover the scope of IoT in vulnerability management.I wanted to pay homage to the work of Rafeeq Rehman and the CISO Mind Map https://rafeeqrehman.com/2023/03/25/ciso-mindmap-2023-what-do-infosec-professionals-really-do/ so with the approval of Rafeeq; I will take an overview or summary of the different areas. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jul 4, 20234 min

Optimizing Security: The Importance of Scoping Network Devices in Your Vulnerability Management Program

This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jun 14, 20233 min

Navigating Vulnerability Management_ Scoping Operating Systems for a Secure Business Future

This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jun 13, 20233 min

Insights into the CISO Mind Map — Vulnerability Management

Diving into the CISO Mindmap - A series providing increased clarity into the role of a CISOI wanted to pay homage to the work of Rafeeq Rehman and the CISO Mind Map https://rafeeqrehman.com/2023/03/25/ciso-mindmap-2023-what-do-infosec-professionals-really-do/ so with the approval of Rafeeq; I will take an overview or summary of the different areas.Posted: Extreme Productivity, by Robert C. PozenAt some point, we’ve all asked ourselves “Where can I get more time to do the things I want to do?” The answer, from Robert C. Pozen, is found in his fascinating new book Extreme Productivity.Click here to view this summary.If you have read this far into my blog, I pick you as a continuous learner. Amy right? I know I am!Check out this new leadership and soft skill development approach called Social Nano Learning.It has been proven to increase team engagement, learning outcomes, and psychological well-being in only 3 minutes daily.I’ve partnered with NanoCourses and can offer you and your team your first NanoCourse (based on the 7 Habits of Highly Effective People) free of charge.There’s a quick 3-minute video describing exactly what NanoCourses is, and how you can get started, here:www.nancourses.io/cpf-coaching-partners This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jun 3, 20234 min

Insights into the CISO Mindmap - Network/Application Firewalls

This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jun 3, 20236 min

Diving into the CISO Mindmap - Security Operations Resilience

This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jun 3, 20235 min

Insights into the CISO Mind Map - Threat Prevention (NIST CSF Identify & Protect)

This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jun 3, 20234 min

Navigating Remote Networking as a Cybersecurity Leader

Also shared on MediumCybersecurity Leadership Development Coaching | CPF Coaching is a reader-supported publication. Support authors by subscribing and supporting the community. To receive new posts and support my work, consider becoming a free or paid subscriber.Book of the WeekRemote Work Revolution, by Tsedal NeeleyUncover the secrets to successfully navigating remote work, boosting productivity, fostering collaboration, and unlocking the full potential of your team in a virtual environment.Click here to view this summary. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

May 28, 20233 min

Understanding your digital supply chain risk

Originally published here: https://www.capitalone.com/tech/cloud/understanding-your-digital-supply-chain-risk/ RemovedUnderstanding your digital supply chain riskManaging the risks associated with digital supply chainsTL;DRUnderstanding your digital supply chain risk is becoming one of the major challenges many businesses face today, especially with the move to cloud and globalization of the computing behind those services. Recommendations on addressing the additional detailing of the supply chain which might be part of any major applications* Ensure that COTS/Third Party Suppliers/SaaS are documented on the security context diagram, threat model, CMDB and any other sources of record, as well as potential platforms which might support them as part of their digital supply chain * Ensuring that these dependencies are captured will help to better identify supply chain risks, threat model potential mitigations for them, as well as a myriad of other detection and response activities What are digital supply chain risks?As companies move to the cloud and computing becomes globalized, it is important to understand your digital supply chain risk and how to mitigate the risks. Risks we will discuss today include gaps in: * Cyber architecture requirements * Change management databases (CMDB)* Software supply chain & software development lifecycles * Supply chain risk management processHow does supply chain risk affect businesses?An organization’s understanding of the supply chain risk of any given system can range in varying degrees based on the number of integrators or suppliers a company might use to generate its revenue through the production of software or delivery of services. In addition to understanding those integrators or suppliers, understanding the external factors which might affect them, and in-turn affect the producer. An organization’s ability to identify, detect and respond to those environmental threats/influences to the supply chain become a critical factor in maintaining the integrity of the production of software and services. An organization’s Third Party Management (TPM) program helps monitor its Third Parties. This program also helps with the lifecycle management of suppliers while servicing the Organization. Due to the complexity of an organization's supply chain, there might be multiple layers of suppliers or intermediaries downstream of the organization. As the layers of downstream supplier’s increase, Organization’s ability to have visibility into those suppliers decreases.In the figure below from NIST SP 800-161r1 demonstrate the decreased invisibility as the layers of the supply chain increase.This blog focuses on the digital supply chain risks which affect organizations. Risk #1: Gaps in cyber architecture requirements What is the risk associated with cyber architecture?Organizations might not document or track 3rd parties/supplier chain infrastructure as part of its supply chain in its Change Management Database (CMDB) and it is not a requirement for it to be completed.Why does the gap in cyber architecture matter? This means that the Organization might not be able to proactively respond to major vulnerabilities in our supply chain which have been integrated or used to build organizations products on. (e.g. Log4J)What is a potential mitigation? Having the ability to understand the technologies used to support solutions by our critical suppliers and have them linked as an artifact in CMDB and TPM. This will provide the organization with the ability to proactively understand the risk exposure from suppliers.Risk #2: Gaps in Change Management Databases (CMDB)Oftentimes, companies do not connect their suppliers or third party applications in CMDB to the authoritative system of record for TPM, therefore understanding the digital supply chain risks caused by those third parties to the applications that they support. The probable impact of gaps in CMDBThis has the potential to limit an organization's ability to proactively respond to major vulnerabilities in the supply chain which have been integrated or used to build organization products on. The potential mitigation of gaps in CMDB Require understanding of the technologies used to support solutions by our critical suppliers and have them linked as an artifact in CMDB and TPM. This aDolus blog includes a diagram demonstrating a software supply chain attack. Risk #3: Gaps in software supply chain and software development lifecycles Currently, an organization has a potential lack of/limited visibility into some of the software libraries ingested from software providers, open source software, etc. Take Log4j as an example. The Black Kite Research Team analyzed nearly 3,000 companies known to be affected or explicitly disclosed to be unaffected by the vulnerability, as shown int he figure below.Potential mitigations of software supply chain and software development lifecycles One of the potential mitigations for increased visibility into the softw

Apr 9, 20238 min

Developing cybersecurity leadership talent pipelines

This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Apr 9, 20231 min

The Top 10 LinkedIn Security Tips: Leaderboards are no longer just in the office

Section 1: Understand the RisksAs a cybersecurity professional, you understand the importance of protecting sensitive information. However, it’s essential to understand the specific risks associated with LinkedIn. For example, hackers often use LinkedIn to gather information for social engineering attacks. Be aware of the risks and take steps to mitigate them.One way to do this is to limit your personal information on LinkedIn. Don’t include sensitive details like your home address or phone number. Also, be cautious about what you post in your profile or status updates. Avoid sharing information that could be used to guess your security questions, like your mother’s maiden name or your first pet’s name.Finally, be aware of phishing scams. Hackers may send you messages on LinkedIn that look legitimate but contain malware or links to fake login pages. Double-check the sender’s email address and verify any links before clicking on them.Section 2: Secure Your AccountThe first step to securing your LinkedIn account is to enable two-factor authentication (2FA). This adds an extra layer of security by requiring a code and your password to log in. LinkedIn offers several 2FA options, including SMS messages, phone calls, and authentication apps like Google Authenticator.It would be best if you also chose a strong, unique password for your LinkedIn account. Avoid using the same password for multiple accounts, and use a combination of letters, numbers, and symbols to make your password more secure.Finally, keep your account up-to-date by regularly reviewing your security settings and checking for suspicious activity.Section 3: Be Mindful of Your ConnectionsLinkedIn is designed to help you connect with other professionals, but it’s essential to be mindful of who you connect with. Before accepting a connection request, please take a few minutes to review the person’s profile and confirm that they are who they say they are.Additionally, be cautious about accepting requests from people you don’t know. Hackers often use fake LinkedIn profiles to gather information or spread malware. If you’re unsure about a connection request, it’s better to err on caution and decline it.Finally, be careful about what you share with your connections. Don’t post sensitive information or business secrets; be cautious about sharing personal details like your home address or phone number.Section 4: Keep Your Profile SecureYour LinkedIn profile is a valuable source of information for hackers, so it’s essential to keep it secure. One way to do this is to limit the information you share. For example, think about when you might share or add to your entire work history or include your phone number.Be cautious about what you post on your profile. Avoid sharing information that could be used to guess your security questions, like your mother’s maiden name or your first pet’s name.Finally, you can set your profile to private if you’re not actively looking for a job. This will prevent recruiters and others from seeing your profile and potentially using your information for phishing scams or other attacks.Section 5: Monitor Your ActivityMonitoring your LinkedIn activity regularly is essential to ensure your account hasn’t been compromised. Check your login history and review any changes to your profile or connections.If you notice any suspicious activity, such as logins from unfamiliar locations or changes to your profile that you didn’t make, take immediate action. Change your password, review your security settings, and contact LinkedIn support if necessary.Additionally, be on the lookout for phishing scams or other suspicious messages. If you receive a message that seems too good to be accurate or asks for sensitive information, it’s likely a scam.Section 6: Use LinkedIn Safely on Public Wi-FiPublic Wi-Fi networks often need to be more secure, which means that hackers can easily intercept your data if you’re not careful. To stay safe using LinkedIn on public Wi-Fi, ensure you use a secure connection. Consider using a virtual private network (VPN) to encrypt your data and protect your privacy.Additionally, be cautious about using public computers to access LinkedIn. Use your device and make sure it’s secure before logging in.Finally, be mindful of who is watching you when using LinkedIn in public. Don’t type in sensitive information if people nearby could see your screen.Section 7: Keep Your LinkedIn App Up-to-DateIf you use the LinkedIn app on your smartphone or tablet, it’s essential to keep it up-to-date. App updates often include security patches that can help protect your data and prevent attacks.Additionally, be cautious about downloading apps from third-party sources. Stick to official app stores like the Apple App Store or Google Play Store to reduce the risk of downloading malware or other malicious apps.Finally, be careful about the permissions you grant to apps on your device. Don’t grant unnecessary permissions, and be cautious about givin

Mar 18, 20237 min

The Digital Risk Digest Live Feat. Christophe Foulon

The Digital Risk Digest Live Feat. Christophe Foulon By https://www.youtube.com/@valor-cybersecurity Welcome to another episode of the Digital Risk Digest Live. We go live every Friday with industry leaders about digital threats, opportunities, and more. Curious about the intersection of business and technology? Tune in today! Let’s give Chris a massive welcome to the show! This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Feb 19, 20231h 0m

New Year Resolutions or Intentions

This is a video about New Year Resolutions or Intentions. I strive to shine a light on the value of others so they can see it in themselves. Developing today's leaders for the generation of tomorrow. https://www.cpf-coaching.com Also, check out the @BreakingIntoCybersecurity Channel for more cybersecurity advice. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jan 2, 20234 min

New Year Resolutions or Intentions

This is a episode about New Year Resolutions or Intentions. I strive to shine a light on the value of others so they can see it in themselves. Developing today's leaders for the generation of tomorrow. https://www.cpf-coaching.com Also, check out the @BreakingIntoCybersecurity podcast for more cybersecurity advice. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Jan 2, 20234 min

Threat Informed Defense Approach to your Career!

This episode is also available as a blog post: https://cpfcoaching.wordpress.com/2022/05/15/threat-informed-defense-approach-to-your-career/Technical blog link: https://medium.com/@christophefoulon_55618/threat-informed-defense-be36d989016c This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

May 15, 20221 min

Reflections on a week with inspiring cybersecurity leaders

This episode is also available as a blog post: https://cpfcoaching.wordpress.com/2022/04/26/reflections-on-a-week-with-inspiring-cybersecurity-leaders/ This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Apr 26, 20226 min

Growing yourself enable you to grow others

This episode is also available as a blog post: https://cpfcoaching.wordpress.com/2022/04/15/growing-yourself-enable-you-to-grow-others/ This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Apr 15, 20221 min

Max Capacity Reached?

This episode is also available as a blog post: https://cpfcoaching.wordpress.com/2022/04/08/max-capacity-reached/ This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Apr 8, 20222 min

Got Coach?

This episode is also available as a blog post: https://cpfcoaching.wordpress.com/2022/03/29/got-coach/ This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Mar 29, 20221 min

What does Waiting Cost you?

This episode is also available as a blog post: https://cpfcoaching.wordpress.com/2022/03/28/what-does-waiting-cost-you/ This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Mar 28, 20220 min

Are you curious or do you say you are?

This episode is also available as a blog post: https://cpfcoaching.wordpress.com/2022/03/25/are-you-curious-or-do-you-say-you-are/ This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe

Mar 25, 20222 min