We are actively looking for a great individual for a position in Colorado Springs. If you know someone who has extensive PCAP analysis experience in the area please have them apply to the link below!
JFL CONSULTING, LLC’s Post
More Relevant Posts
-
Recently, more than one reader here has observed that my presence is technical. Looking back I can see where that come from and thought it was worth providing some context (and balance) and talk a bit about the "why" of that exploration (or, perhaps, one of the whys, because I like to make my wanderings serve more than one purpose). In this case, the why was about exploring zero trust, where endpoint security and continuous monitoring are two of the key pillars. Understanding the state of the endpoint is table stakes, but being about to reason about it, enrich that state information, and therefore reason about the threats to it and the threat to an organisation from it, is where that becomes meaningful. Does this endpoint have have wider access than most? Is the end user someone with elevated privileges? Is it typically used in a higher risk environment? Understanding the purpose and context of who is using the device, what for, where and when. It's rare that an endpoint security tool meaningfully addresses these, or can, without over-reliance on manually managed information such as asset management spreadsheets and being able to make balanced risk-informed decisions, educate staff, or hunt for emergent threats relies on this greater context and putting the user and the job they're trying to perform at the heart of things. Expect more on this as I pull these thoughts into coherence; happy for challenges and resonances in the comments in the meantime.
To view or add a comment, sign in
-
Next time you hire for your Security Team, use a specialist not a generalist.
To view or add a comment, sign in
-
-
Physical security assessments are vital in detecting risks in the tangible environment. Secure your premises. 🏢 #PhysicalSecurity https://lnkd.in/gxvPr-K4
Physical Security Assessment - Blue Goat Cyber
https://bluegoatcyber.com
To view or add a comment, sign in
-
Professional on Elite IT- IP Analog CCTV Wireless Surveillance System Installer Intercom/ Hardware, Software, Server, System Repair & 💻 🖥️ Accessories
IT security professional face a host of technical and organizational challenge in preparing for the future.
To view or add a comment, sign in
-
🌟𝐏𝐚𝐬𝐬 𝐲𝐨𝐮𝐫 𝐂𝐲𝐒𝐀+ 𝐄𝐱𝐚𝐦🌟 Question: Which level of intelligence is directly used by Security Operations Center (SOC) staff to make real-time decisions in response to system alerts? A. Operational B.Strategic C. Analytical D. Tactical
To view or add a comment, sign in
-
This is my working model for communication / sharing among an information security team. Please toss eggs at it or -- if you like it -- please adapt it. Some keys here are the need for the team to communicate well with each other as well as with stakeholders around the org. Personally, I find the vulnerability management and adaptation phases to be far less stressful than incident response.
To view or add a comment, sign in
-
-
I help marketing departments with the hard stuff. #WordPress, #Hosting, #Security #CustomDevelopment, and that is what this channel is about.
Happy Friday everyone! One thing most people don't have until it's too late is an Incident Response Plan. Anyone who hosts websites for clients should take the time to develop and maintain one to quickly address and mitigate the impact of any security incidents. All this outlines the procedures for responding to security incidents with the goal is to mitigate damage, recover functionality, and prevent future incidents. Example of what would be covered are: Preparation Detection Identification Containment Remediation Recovery Communication Improvements Let me know what I missed
To view or add a comment, sign in
-
-
Microsoft Certified Security admin// Information Systems Audit & Control\\Entry level SOC & security analyst\\Passion for data-driven financial services \\Data analyst
Hi! I'm Samuel George, an Information Systems Control professional. I was not always in internal control. I started my professional work experience in operations, where I had the opportunity of interfacing with customers and learning quite a lot about customer service and customer experience. Then I skilled up and looked forward to transitioning into I.T or cybersecurity, where skills can be put to use. For some reason, it didn't click and I got the opportunity for information systems Control and learned a lot in such a period. It's difficult without a mentor and stakeholders complying, but I'm here to share my experience and knowledge gained so far. Imagine all the information an organization uses like it's a big treasure chest. My job is to make sure this chest has strong locks and clear rules on who can open it and what they can take. Information Systems Controls are like these locks and rules. They help keep information safe, accurate, and reliable, which is important for any organization to function smoothly. Just like a treasure chest needs protection, so does the valuable information organizations use! Lemme allow you to gulp all these in before we go even further in my journey so far. It's a beautiful day. Remember to stay positive and always look on the bright side of life. #staypositive #staygrateful #dataanalytics
To view or add a comment, sign in
-
-
Read this Crowe article to see how you can take proactive steps to mitigate risks that accompany local admin privileges.
Local admin privileges: A double-edged sword
crowe.com
To view or add a comment, sign in
-
The top 5 operational technology (OT) security mitigations for industrial assets include: • Documentation • Network Hardening • Backup & Recovery • Identity & Access Management • System Hardening The steps to get there are basic. Some might even call them boring. But they’re really important. Our OT-focused team has been inside of a plant and understands all the tedious steps. Bonus: we don’t think the work is boring.
To view or add a comment, sign in