Cybersecurity Frameworks 103: What You Need to Know About MITRE and Kill Chain

Understanding an adversaries tactics, techniques and procedures is required to defend and anticipate their attacks. In doing so, there are particular threat modeling frameworks available to assist with giving analysts and practitioners the ability to apply a decision making process to their cyber defense posture. These methodologies identify what attackers must accomplish in order to achieve their goals and what you can do thwart their efforts.

Cybersecurity Frameworks 102 - What You Need to Know about ISO 27001 and NIST CSF

This is the second webinar in a series of cybersecurity frameworks webinar. The last webinar discussed NIST and the CIS controls. It described how these controls are the building blocks of any security program. During this webinar we discussed program frameworks like ISO 27001 and NIST CSF. This takes the building blocks of the CIS controls and puts them in a framework to help structure your program. Using these program frameworks helps establish a baseline for evaluating your maturity and establish a roadmap for your organization.

Cybersecurity Frameworks 101: What You Need to Know About NIST and CIS

There is widespread recognition about the benefits of implementing the NIST Cybersecurity Framework and the CIS Critical Security Controls. Organizations are looking for guidance about how they can strengthen security in phases using risk-based prioritization along with these frameworks and controls. During this webinar replay CCSI provides basic information about implementing NIST CSF in conjunction with the risk-based prioritization offered by the CIS Critical Security Controls.

How are You Handling Your Cloud Infrastructure Security Concerns Webinar Replay

As companies look to transition workloads to the public cloud, what are the security concerns specific to cloud infrastructure? When using a public cloud provider, there are a lot of services and controls to learn in order to conform to security best practices. In this webinar replay we walk through some security controls that could help, how to monitor for threats, and some best practices to keep your cloud secure. We’ll dive into Amazon Web Services (AWS) specifically, but these concepts apply to other (or multiple) public clouds as well.

How Secure is Your Cloud Investment?

Cloud native and hybrid cloud deployments enhance cyber resilience through the automation and orchestration of cloud services, which allows for continuous integration and continuous delivery (CI/CD) across multiple platforms. To measurably manage cloud ecosystem cyber risk, you need insight into your organization’s cyber resilience and current cloud cyber risk posture. The results of a Cloud Security Assessment enables leadership to make informed cyber risk-based decisions, improve deployment orchestration and automation, and identify ROI on cloud security investments. Learn more in this webinar replay.

Steps to Take to Ready Your Business Continuity Plans

During this time you probably have begun to wonder what your business may have to do if there is a mass self-quarantine. Many aspects in keeping a business continuing to run falls on the IT department to initiate or upgrade. In this webinar replay CCSI covers the key components of a business continuity plan and the benefits of a table top BCDR simulation.

Who you gonna call.. when there is a security breach?

The best way to prepare your organization during a security breach or disaster is running through exercises that force you into this mindset. At CCSI, we work with putting our clients through these scenarios with custom made tabletop exercises to prepare them for similar events. It’s helpful for organizations as a whole to live this experience, even if it’s just a tabletop, in order to understand the ramifications of where they might have blinders on from a maturity standpoint.

Cloud Computing is more Secure than On-Prem?

The perception is that Public Cloud is less secure than an on-prem solution. In reality, there are less breaches in the public cloud than in on-prem data centers. Even still, you need to take precautions.

Incident Response: Make the First 24 Hours Count

Incident response teams are often hampered by an inability to see what is happening on their network, rendering them unable to confidently detect threats or respond quickly and effectively.

So how can the top law firms accelerate threat detection and response? Join Ricardo Font, Product Marketing Manager for Gigamon Insight, and Matt Pascucci, Cybersecurity Practice Manager for CCSI, as we dive into metadata’s critical role in incident detection and response strategies.

Hybrid Cloud Strategy to Optimize Your Data Infrastructure

Not all data is created equal. Different workloads need different performance and for that reason companies need to develop a data storage strategy that works for all different types of data.

The Predator Within - Do you know what is lurking in your network?

How do you protect your firm’s Data from the invaders within? You always hear about external data breaches. But, in fact, more and more breaches are coming from within your own firm. And making it more difficult, is that many data breaches from insiders are completely unintentional. Learn how to find insider risk and prevent breaches in this webinar replay.

Observability: Metric, Logging, and Tracing, OH MY!

Is observability just a rebranding of monitoring? Is it monitoring on steroids? Or, is it the new way to find out “why” your system, IT or application isn’t working as expected rather simply “if” it is working or not?

To achieve observability, IT needs to correlate many different sources from logs, metrics, traces, etc.

Identify Risks in Your Organization before a Cyber Attack

The threat of attack is continually on the horizon and attackers are consistently using misconfigurations and vulnerabilities found in a victim’s organization with malicious intent. Organizations need to properly identify their weaknesses and create a plan of action on how to remediate these exposures against future attacks. Learn how to reduce risk in your organization today, in this free webinar replay.

CCSI Visibility as a Service

Moving to a cloud environment forces many companies to rethink host-centric monitoring because instances come and go, and different groups within their organization spin up new stacks with little advance notice. Hybrid Cloud and Microservices are by nature, highly dynamic environments. CCSI’s Visibility and NOC Services are designed from the ground up for the unique demands of cloud-based workloads.

Site Reliability Engineering - Turbo Charging DevOps

Systems Administration is finished. DevOps is a helpful band aid. But, we need to move beyond the entire notion of “Administration” and “Operations” in the field of computing (software, systems, and networking). Whether you’re still figuring out how to create a site reliability practice at your company or you’re trying to improve the processes and habits of an existing SRE team, join CCSI’s Cloud Practice Manager as he discusses the principles and philosophy behind Site Reliability Engineering.

CCSI Cloud Cost Management

Your organization moved to the cloud, but control of cloud accounts is decentralized and it is challenging to pinpoint where waste is occurring and how to eliminate it on an ongoing basis. This is where CCSI’s Cost Containment service can bring cost control and long-term cloud cost management to your business.

Cloud Benefits for SMB - Business Continuity

According to a study conducted by the Cloud Security Alliance, 33% of organizations have a “full steam ahead” attitude toward cloud services, while 86% of companies spend at least part of their IT budget on cloud services. The Cloud provides tremendous benefits see how Cloud can truly improve your SMB.

Cloud Benefits for SMB - Cloud Migration

Joe Goldberg, Cloud Practice Manager at CCSI with Joe Aulicino, Sales Executive at CCSI goes over cloud migration and how it can benefit your SMB.

NYS DFS Cybersecurity Regulation Phase 4 webinar

CCSI discusses the NYS DFS Cybersecurity webinar series on the Phase 4 requirements for the New York State’s Department of Financial Services (DFS) 23 NYCRR 500 Regulation. This webinar will have Matthew Pascucci, Cybersecurity Practice Manager for CCSI, discuss the items required for the final Phase 4.

NYS DFS Annual Filing Review

Matthew Pascucci from CCSI, Gabrial Gumbs from STEALTHbits, and Paul Ferrillo from Weil’s Litigation discuss the NYS DFS 23 NYCRR 500 Certification of Compliance and how to submit the certification due on February 15.

CCSI ThreatProtect Service

Matthew Pascucci discusses ransomware, threat prevention, and threat hunting.

File Activity Monitoring Made Simple

See how the STEALTHbits File Activity Monitor is a simple to install, easy-to-use, affordable solution that monitors and stores file activity for Windows File Servers and NAS devices (NetApp, EMC, Hitachi), without any reliance on native logging.

FireMon's Automated Firewall Management Software

CCSI partner FireMon will introduce you to FireMon Security Manager, the foundation of the Intelligent Security Management platform. Security Manager enables real-time, consolidated firewall monitoring and assessments to help address the three most common firewall management challenges.

CCSI - INTO- Webinar - April 2018

Application Aware SD-WAN and the Secured Cloud

CCSI along with Netskope and Silver Peak discussed SD-WAN and securing the Cloud. Silver Peak’s SD-WAN is the network solution for applications moving to the cloud and Netskope’s CASB solution will provide you with the visibility and control requirements of cloud applications.

Learn the Difference between DRaaS and BaaS

Cloud computing comes in several deployment scenarios (private, public, and hybrid) and across many different applications. Learn how Contemporary Computer Services Inc. can help your organization with our cloud solutions.

Cloud Migration Services

CCSI Cloud Migration Services Overview. Discovery, Assessment, Migration Planning, Migration & Testing, and Go LIVE!

Project SAFEguard Digital Platform

Project SAFEguard security solution is a digitally integrated system designed to depict emergency procedures and communications protocols alongside real-time video and sensor feeds on a digital floor plan in one single application.