Who you gonna call.. when there is a security breach?

The best way to prepare your organization during a security breach or disaster is running through exercises that force you into this mindset. At CCSI, we work with putting our clients through these scenarios with custom made tabletop exercises to prepare them for similar events. It’s helpful for organizations as a whole to live this experience, even if it’s just a tabletop, in order to understand the ramifications of where they might have blinders on from a maturity standpoint.

Cloud Computing is more Secure than On-Prem?

The perception is that Public Cloud is less secure than an on-prem solution. In reality, there are less breaches in the public cloud than in on-prem data centers. Even still, you need to take precautions.

Incident Response: Make the First 24 Hours Count

Incident response teams are often hampered by an inability to see what is happening on their network, rendering them unable to confidently detect threats or respond quickly and effectively.

So how can the top law firms accelerate threat detection and response? Join Ricardo Font, Product Marketing Manager for Gigamon Insight, and Matt Pascucci, Cybersecurity Practice Manager for CCSI, as we dive into metadata’s critical role in incident detection and response strategies.

Hybrid Cloud Strategy to Optimize Your Data Infrastructure

Not all data is created equal. Different workloads need different performance and for that reason companies need to develop a data storage strategy that works for all different types of data.

The Predator Within - Do you know what is lurking in your network?

How do you protect your firm’s Data from the invaders within? You always hear about external data breaches. But, in fact, more and more breaches are coming from within your own firm. And making it more difficult, is that many data breaches from insiders are completely unintentional. Learn how to find insider risk and prevent breaches in this webinar replay.

Observability: Metric, Logging, and Tracing, OH MY!

Is observability just a rebranding of monitoring? Is it monitoring on steroids? Or, is it the new way to find out “why” your system, IT or application isn’t working as expected rather simply “if” it is working or not?

To achieve observability, IT needs to correlate many different sources from logs, metrics, traces, etc.

Identify Risks in Your Organization before a Cyber Attack

The threat of attack is continually on the horizon and attackers are consistently using misconfigurations and vulnerabilities found in a victim’s organization with malicious intent. Organizations need to properly identify their weaknesses and create a plan of action on how to remediate these exposures against future attacks. Learn how to reduce risk in your organization today, in this free webinar replay.

CCSI Visibility as a Service

Moving to a cloud environment forces many companies to rethink host-centric monitoring because instances come and go, and different groups within their organization spin up new stacks with little advance notice. Hybrid Cloud and Microservices are by nature, highly dynamic environments. CCSI’s Visibility and NOC Services are designed from the ground up for the unique demands of cloud-based workloads.

Site Reliability Engineering - Turbo Charging DevOps

Systems Administration is finished. DevOps is a helpful band aid. But, we need to move beyond the entire notion of “Administration” and “Operations” in the field of computing (software, systems, and networking). Whether you’re still figuring out how to create a site reliability practice at your company or you’re trying to improve the processes and habits of an existing SRE team, join CCSI’s Cloud Practice Manager as he discusses the principles and philosophy behind Site Reliability Engineering.

CCSI Cloud Cost Management

Your organization moved to the cloud, but control of cloud accounts is decentralized and it is challenging to pinpoint where waste is occurring and how to eliminate it on an ongoing basis. This is where CCSI’s Cost Containment service can bring cost control and long-term cloud cost management to your business.

Cloud Benefits for SMB - Business Continuity

According to a study conducted by the Cloud Security Alliance, 33% of organizations have a “full steam ahead” attitude toward cloud services, while 86% of companies spend at least part of their IT budget on cloud services. The Cloud provides tremendous benefits see how Cloud can truly improve your SMB.

Cloud Benefits for SMB - Cloud Migration

Joe Goldberg, Cloud Practice Manager at CCSI with Joe Aulicino, Sales Executive at CCSI goes over cloud migration and how it can benefit your SMB.

NYS DFS Cybersecurity Regulation Phase 4 webinar

CCSI discusses the NYS DFS Cybersecurity webinar series on the Phase 4 requirements for the New York State’s Department of Financial Services (DFS) 23 NYCRR 500 Regulation. This webinar will have Matthew Pascucci, Cybersecurity Practice Manager for CCSI, discuss the items required for the final Phase 4.

NYS DFS Annual Filing Review

Matthew Pascucci from CCSI, Gabrial Gumbs from STEALTHbits, and Paul Ferrillo from Weil’s Litigation discuss the NYS DFS 23 NYCRR 500 Certification of Compliance and how to submit the certification due on February 15.

CCSI ThreatProtect Service

Matthew Pascucci discusses ransomware, threat prevention, and threat hunting.

File Activity Monitoring Made Simple

See how the STEALTHbits File Activity Monitor is a simple to install, easy-to-use, affordable solution that monitors and stores file activity for Windows File Servers and NAS devices (NetApp, EMC, Hitachi), without any reliance on native logging.

FireMon's Automated Firewall Management Software

CCSI partner FireMon will introduce you to FireMon Security Manager, the foundation of the Intelligent Security Management platform. Security Manager enables real-time, consolidated firewall monitoring and assessments to help address the three most common firewall management challenges.

CCSI - INTO- Webinar - April 2018

Application Aware SD-WAN and the Secured Cloud

CCSI along with Netskope and Silver Peak discussed SD-WAN and securing the Cloud. Silver Peak’s SD-WAN is the network solution for applications moving to the cloud and Netskope’s CASB solution will provide you with the visibility and control requirements of cloud applications.

Learn the Difference between DRaaS and BaaS

Cloud computing comes in several deployment scenarios (private, public, and hybrid) and across many different applications. Learn how Contemporary Computer Services Inc. can help your organization with our cloud solutions.

Cloud Migration Services

CCSI Cloud Migration Services Overview. Discovery, Assessment, Migration Planning, Migration & Testing, and Go LIVE!

Project SAFEguard Digital Platform

Project SAFEguard security solution is a digitally integrated system designed to depict emergency procedures and communications protocols alongside real-time video and sensor feeds on a digital floor plan in one single application.