Understanding an adversaries tactics, techniques and procedures is required to defend and anticipate their attacks. In doing so, there are particular threat modeling frameworks available to assist with giving analysts and practitioners the ability to apply a decision making process to their cyber defense posture. These methodologies identify what attackers must accomplish in order to achieve their goals and what you can do thwart their efforts.
Cybersecurity Frameworks 102 - What You Need to Know about ISO 27001 and NIST CSF
This is the second webinar in a series of cybersecurity frameworks webinar. The last webinar discussed NIST and the CIS controls. It described how these controls are the building blocks of any security program. During this webinar we discussed program frameworks like ISO 27001 and NIST CSF. This takes the building blocks of the CIS controls and puts them in a framework to help structure your program. Using these program frameworks helps establish a baseline for evaluating your maturity and establish a roadmap for your organization.
Cybersecurity Frameworks 101: What You Need to Know About NIST and CIS
There is widespread recognition about the benefits of implementing the NIST Cybersecurity Framework and the CIS Critical Security Controls. Organizations are looking for guidance about how they can strengthen security in phases using risk-based prioritization along with these frameworks and controls. During this webinar replay CCSI provides basic information about implementing NIST CSF in conjunction with the risk-based prioritization offered by the CIS Critical Security Controls.
How Secure is Your Cloud Investment?
Cloud native and hybrid cloud deployments enhance cyber resilience through the automation and orchestration of cloud services, which allows for continuous integration and continuous delivery (CI/CD) across multiple platforms. To measurably manage cloud ecosystem cyber risk, you need insight into your organization’s cyber resilience and current cloud cyber risk posture. The results of a Cloud Security Assessment enables leadership to make informed cyber risk-based decisions, improve deployment orchestration and automation, and identify ROI on cloud security investments. Learn more in this webinar replay.
Steps to Take to Ready Your Business Continuity Plans
During this time you probably have begun to wonder what your business may have to do if there is a mass self-quarantine. Many aspects in keeping a business continuing to run falls on the IT department to initiate or upgrade. In this webinar replay CCSI covers the key components of a business continuity plan and the benefits of a table top BCDR simulation.
Incident Response: Make the First 24 Hours Count
Incident response teams are often hampered by an inability to see what is happening on their network, rendering them unable to confidently detect threats or respond quickly and effectively.
So how can the top law firms accelerate threat detection and response? Join Ricardo Font, Product Marketing Manager for Gigamon Insight, and Matt Pascucci, Cybersecurity Practice Manager for CCSI, as we dive into metadata’s critical role in incident detection and response strategies.
The Predator Within - Do you know what is lurking in your network?
How do you protect your firm’s Data from the invaders within? You always hear about external data breaches. But, in fact, more and more breaches are coming from within your own firm. And making it more difficult, is that many data breaches from insiders are completely unintentional. Learn how to find insider risk and prevent breaches in this webinar replay.
Observability: Metric, Logging, and Tracing, OH MY!
Is observability just a rebranding of monitoring? Is it monitoring on steroids? Or, is it the new way to find out “why” your system, IT or application isn’t working as expected rather simply “if” it is working or not?
To achieve observability, IT needs to correlate many different sources from logs, metrics, traces, etc.
Identify Risks in Your Organization before a Cyber Attack
The threat of attack is continually on the horizon and attackers are consistently using misconfigurations and vulnerabilities found in a victim’s organization with malicious intent. Organizations need to properly identify their weaknesses and create a plan of action on how to remediate these exposures against future attacks. Learn how to reduce risk in your organization today, in this free webinar replay.
CCSI Visibility as a Service
Moving to a cloud environment forces many companies to rethink host-centric monitoring because instances come and go, and different groups within their organization spin up new stacks with little advance notice. Hybrid Cloud and Microservices are by nature, highly dynamic environments. CCSI’s Visibility and NOC Services are designed from the ground up for the unique demands of cloud-based workloads.
Site Reliability Engineering - Turbo Charging DevOps
Systems Administration is finished. DevOps is a helpful band aid. But, we need to move beyond the entire notion of “Administration” and “Operations” in the field of computing (software, systems, and networking). Whether you’re still figuring out how to create a site reliability practice at your company or you’re trying to improve the processes and habits of an existing SRE team, join CCSI’s Cloud Practice Manager as he discusses the principles and philosophy behind Site Reliability Engineering.
CCSI Cloud Cost Management
Your organization moved to the cloud, but control of cloud accounts is decentralized and it is challenging to pinpoint where waste is occurring and how to eliminate it on an ongoing basis. This is where CCSI’s Cost Containment service can bring cost control and long-term cloud cost management to your business.
Cloud Benefits for SMB - Business Continuity
According to a study conducted by the Cloud Security Alliance, 33% of organizations have a “full steam ahead” attitude toward cloud services, while 86% of companies spend at least part of their IT budget on cloud services. The Cloud provides tremendous benefits see how Cloud can truly improve your SMB.
NYS DFS Cybersecurity Regulation Phase 4 webinar
CCSI discusses the NYS DFS Cybersecurity webinar series on the Phase 4 requirements for the New York State’s Department of Financial Services (DFS) 23 NYCRR 500 Regulation. This webinar will have Matthew Pascucci, Cybersecurity Practice Manager for CCSI, discuss the items required for the final Phase 4.
FireMon's Automated Firewall Management Software
CCSI partner FireMon will introduce you to FireMon Security Manager, the foundation of the Intelligent Security Management platform. Security Manager enables real-time, consolidated firewall monitoring and assessments to help address the three most common firewall management challenges.
Application Aware SD-WAN and the Secured Cloud
CCSI along with Netskope and Silver Peak discussed SD-WAN and securing the Cloud. Silver Peak’s SD-WAN is the network solution for applications moving to the cloud and Netskope’s CASB solution will provide you with the visibility and control requirements of cloud applications.