This is the second webinar in a series of cybersecurity frameworks webinar. The last webinar discussed NIST and the CIS controls. It described how these controls are the building blocks of any security program. During this webinar we discussed program frameworks like ISO 27001 and NIST CSF. This takes the building blocks of the CIS controls and puts them in a framework to help structure your program. Using these program frameworks helps establish a baseline for evaluating your maturity and establish a roadmap for your organization.
There is widespread recognition about the benefits of implementing the NIST Cybersecurity Framework and the CIS Critical Security Controls. Organizations are looking for guidance about how they can strengthen security in phases using risk-based prioritization along with these frameworks and controls. During this webinar replay CCSI provides basic information about implementing NIST CSF in conjunction with the risk-based prioritization offered by the CIS Critical Security Controls.
Cloud native and hybrid cloud deployments enhance cyber resilience through the automation and orchestration of cloud services, which allows for continuous integration and continuous delivery (CI/CD) across multiple platforms. To measurably manage cloud ecosystem cyber risk, you need insight into your organization’s cyber resilience and current cloud cyber risk posture. The results of a Cloud Security Assessment enables leadership to make informed cyber risk-based decisions, improve deployment orchestration and automation, and identify ROI on cloud security investments. Learn more in this webinar replay.
During this time you probably have begun to wonder what your business may have to do if there is a mass self-quarantine. Many aspects in keeping a business continuing to run falls on the IT department to initiate or upgrade. In this webinar replay CCSI covers the key components of a business continuity plan and the benefits of a table top BCDR simulation.
Incident response teams are often hampered by an inability to see what is happening on their network, rendering them unable to confidently detect threats or respond quickly and effectively.
So how can the top law firms accelerate threat detection and response? Join Ricardo Font, Product Marketing Manager for Gigamon Insight, and Matt Pascucci, Cybersecurity Practice Manager for CCSI, as we dive into metadata’s critical role in incident detection and response strategies.
How do you protect your firm’s Data from the invaders within? You always hear about external data breaches. But, in fact, more and more breaches are coming from within your own firm. And making it more difficult, is that many data breaches from insiders are completely unintentional. Learn how to find insider risk and prevent breaches in this webinar replay.
Is observability just a rebranding of monitoring? Is it monitoring on steroids? Or, is it the new way to find out “why” your system, IT or application isn’t working as expected rather simply “if” it is working or not?
To achieve observability, IT needs to correlate many different sources from logs, metrics, traces, etc.
The threat of attack is continually on the horizon and attackers are consistently using misconfigurations and vulnerabilities found in a victim’s organization with malicious intent. Organizations need to properly identify their weaknesses and create a plan of action on how to remediate these exposures against future attacks. Learn how to reduce risk in your organization today, in this free webinar replay.
Moving to a cloud environment forces many companies to rethink host-centric monitoring because instances come and go, and different groups within their organization spin up new stacks with little advance notice. Hybrid Cloud and Microservices are by nature, highly dynamic environments. CCSI’s Visibility and NOC Services are designed from the ground up for the unique demands of cloud-based workloads.
Systems Administration is finished. DevOps is a helpful band aid. But, we need to move beyond the entire notion of “Administration” and “Operations” in the field of computing (software, systems, and networking). Whether you’re still figuring out how to create a site reliability practice at your company or you’re trying to improve the processes and habits of an existing SRE team, join CCSI’s Cloud Practice Manager as he discusses the principles and philosophy behind Site Reliability Engineering.
Your organization moved to the cloud, but control of cloud accounts is decentralized and it is challenging to pinpoint where waste is occurring and how to eliminate it on an ongoing basis. This is where CCSI’s Cost Containment service can bring cost control and long-term cloud cost management to your business.
According to a study conducted by the Cloud Security Alliance, 33% of organizations have a “full steam ahead” attitude toward cloud services, while 86% of companies spend at least part of their IT budget on cloud services. The Cloud provides tremendous benefits see how Cloud can truly improve your SMB.
CCSI discusses the NYS DFS Cybersecurity webinar series on the Phase 4 requirements for the New York State’s Department of Financial Services (DFS) 23 NYCRR 500 Regulation. This webinar will have Matthew Pascucci, Cybersecurity Practice Manager for CCSI, discuss the items required for the final Phase 4.