PROACTIVERISK
  • > About
    • Mission | People
    • Capabilities Statement
    • Blog
    • 800 lb Gorilla
    • Press & Events
    • Videos
    • Careers
    • Books & Tools
    • Referral Program
    • Portals > >
      • Client Portal
      • Staff Portal
  • > Assess
    • Framework Audit
    • AI Investigate
    • RED/BLUE TEAM
    • Continuous Testing
    • 365 Tenant Assessment
    • Industrial Controls
    • Digital Evidence
    • Table Top Exercises
  • > Train
    • Talent Acquisition
    • Threat Modeling
    • Virtual and Physcial
  • > Manage
    • Fractional CISO
    • 365 Protect
    • Vendor Risk Management
    • Managed Security Awareness
    • Physical Security
    • Custom Software
    • ContinuityXpert
    • Technology Support
  • > Industry
    • State and Local Gov.
    • Legal and Accounting Firms:
    • Financial Technology
    • Healthcare

GRAY BEARD BLOG

SHARING RANDOM THOUGHTS ON TECH

Introducing the inaugural NJBIZ Veterans in Business honorees

9/26/2023

0 Comments

 
NJBIZ is proud to introduce the inaugural recipients of the Veterans in Business awards. 
https://njbiz.com/introducing-the-inaugural-njbiz-veterans-in-business-honorees/ 

Created by NJBIZ Associate Publisher and General Manager AnnMarie Karczmit in honor of her late father, who served in the Korean war, this new program recognizes veterans who are making a significant impact on New Jersey business as well as continuing to give back to their community. 

This year’s 41 honorees served across the United States’ military branches, including the Air Force, Air National Guard, Army, Marines, Navy and Coast Guard. 
The judges for this year’s awards – who are all military veterans themselves – were: Dominick Belfiore, vice president business banking relationship manager, M&T Bank; Eddie Condello, vice president, team leader and commercial lending officer, Columbia Bank; and Schone Malliet, CEO and president, Winter4Kids. 
Please join us for a virtual awards ceremony at 8:30 a.m. Nov. 7 to honor these individuals. Registration information will be available on the event page. 

NJBIZ will also recognize the honorees in a special section included in the Nov. 20 issue of NJBIZ. 
For sponsorship opportunities, please contact Karczmit at [email protected].
Congratulations to the 2023 Veterans in Business honorees! George Akins, director of clinical pastoral services education and pastoral care

George Akins, director of clinical pastoral services education and pastoral care
Hackensack Meridian Health

Eric Basek, chief operations officer
Remarkabl

Tom Brennan, ethical hacker
Proactive Risk Inc.

Alyza Brevard-Rodriguez, CEO and founder
SW3AT Wellness x The Other Side Dispensary

William Brown, president
Veteran Alumni of Rutgers University and Navy SEAL Foundation

JP Buss, managing partner
Thunderbolt Solutions

Ronald Campione, senior council
DOWC LLC

Jeff Cantor, CEO
NJ State Veterans Chamber of Commerce

Joseph Chinnici, banking center manager
Provident Bank

Dan Conley, active angel investor
Angels + LifeSci Investors Network, NJAngels.net

Francisco Cortes, president and co-founder
NJ State Veterans Chamber of Commerce

Brett D’Alessandro, president
Backpacks For Life

Dennis Devery, vice president for enrollment management
Thomas Edison State University

Russell DiNardo, president and founder
ThinkForm Architects

Michael Ferraro, chief career door opener
Bridging the Gap for Veterans

Andrew Frazier, founder
Small Business Pro University

Porfirio Garcia, director of marketing
Greater Elizabeth Chamber of Commerce / Elizabeth Tourism

Michael Griffinger, senior director (retired)
Gibbons PC

John Hoffmann, certified public accountant
Independence Financial Services LLC

Cindy Jebb, president
Ramapo College of New Jersey

Joshua King, senior vice president, Supply Chain and Strategic Projects
American Water Works Co.

Michael Lafferty, general manager
Recycling Management Resources

Ryan Leonard, CEO
NJF Worldwide LLC

Oliver Lewis Jr., executive vice president, head of commercial banking
Columbia Bank

Jack Licata, president
Fast Bags Corp.

Jonathan Loane, vice president, Finance, Global MedTech Supply Chain
Johnson & Johnson

Lance Lopez Sr., project manager, Veterans and Community Recruitment
New Jersey Manufacturing Extension Program (NJMEP)

Christopher Manente, founding executive director
Rutgers Center for Adult Autism Services

James Marshmon, director, Student Development and Campus Life
Berkeley College

Antonio Martinez, president and CEO
Renaissance Global Services LLC

Cathy McBarnette-Neilley, founder and president
Spin Doctor Laundromats LLC

John McCarthy, partner
Schenck, Price, Smith & King LLP

Robert McGowan, chief operating and finance officer
Chiesa Shahinian & Giantomasi PC

Keith McWha, partner
Lerner David LLP

Kevin O’Connor, chair, Business Litigation; co-chair, Labor and Employment
Peckar & Abramson PC

John Prutting, veterans outreach coordinator
Angelic Health Hospice and Palliative Care

Brendan Rezny, senior vice president, retail regional manager
M&T Bank

Steven Robles, vice president
Citibank

Tom Scazzafavo, partner
EY

David Van Bever, executive director, Environmental and Transportation Services
Holy Name

Andrew Wood, chief financial officer
APi Group Inc./J. Fletcher Creamer & Son Inc.


0 Comments

its a people problem

9/21/2023

0 Comments

 
​In today's digital landscape, cybersecurity is of paramount importance for organizations across all industries. Despite extensive investments in advanced security technologies, a company's employees can be a significant vulnerability. Some employees may inadvertently put their organization at risk by clicking on phishing links, falling for scams, or unknowingly downloading malware. While these actions can expose an organization to potential threats, it is essential for management to address these issues with a constructive and proactive approach.
 
Identifying the Problem
The first step in managing employees who are cybersecurity liabilities is to recognize the problem. Some individuals may not fully understand the consequences of their actions or the various techniques used by cybercriminals to exploit vulnerabilities. It is crucial to approach this issue with empathy and understand that not everyone has the same level of cybersecurity knowledge.
 
Creating a Culture of Cybersecurity
Fostering a culture of cybersecurity awareness is essential for any organization. Management should implement regular training sessions and workshops to educate employees about the latest cybersecurity threats, best practices, and safe online behaviors. These sessions should be interactive, engaging, and tailored to suit the diverse learning styles of the workforce.
 
Encouraging Reporting and Learning from Mistakes
To address the issue effectively, it is essential to create an environment where employees feel comfortable reporting potential cybersecurity incidents or their own mistakes. This will help management identify problem areas and offer personalized guidance to individuals who need it. Promoting a blame-free culture will encourage employees to be more proactive in their cybersecurity practices.
 
Customizing Training Programs
Not all employees have the same level of technical expertise or knowledge when it comes to cybersecurity. By customizing training programs based on individual roles and responsibilities, management can ensure that employees receive targeted and relevant education. Some employees may need more hands-on training, while others might benefit from online resources and simulations.
 
Incentivizing Good Cybersecurity Practices
Positive reinforcement can be a powerful motivator. Management can create incentives for employees who consistently display good cybersecurity practices. Recognizing and rewarding employees who report potential threats, complete cybersecurity training, or contribute to improving the organization's security posture will encourage others to follow suit.
 
Collaborating with IT and Security Teams
A strong collaboration between management, IT, and security teams is crucial in addressing cybersecurity concerns. These teams can work together to identify common weak points and develop targeted solutions to enhance the organization's overall security measures. By understanding the patterns of employee vulnerabilities, IT and security teams can focus on implementing specific technical controls and threat detection mechanisms.
 
Balancing Strengths and Weaknesses
An employee's value to the organization should not be solely based on their cybersecurity knowledge. While a lack of cybersecurity awareness can be concerning, it should be balanced against their strengths in other areas. If an employee excels in their core responsibilities and demonstrates dedication and commitment, management should consider providing additional support and resources to improve their cybersecurity know-how.
 
Conclusion
Managing employees who pose cybersecurity liabilities requires a combination of understanding, education, and collaboration. By creating a culture of cybersecurity awareness, customizing training programs, and incentivizing good practices, organizations can significantly reduce the risk of cyber threats. Additionally, strong collaboration between management, IT, and security teams is vital in implementing comprehensive cybersecurity strategies.
While cybersecurity awareness is essential for all employees, it is equally crucial to acknowledge an individual's overall contributions to the organization. With a proactive and supportive approach, management can work with employees to improve their cybersecurity know-how, ensuring a safer digital environment for the entire organization.
 
0 Comments

PROACTIVE RISK MANAGEMENT

9/11/2023

0 Comments

 
A source of confusion for many is the defined summary of risk types.  Below is a summary to help you better classify it when speaking to it internally or externally. 

First-Party Risk:
First-party risk, also known as internal risk, involves threats that originate from within the organization itself. These risks typically result from the organization's own actions, decisions, or internal processes. Examples of first-party risks in cybersecurity include employee errors, insider threats, and inadequate security policies or practices.

Second-Party Risk:
Second-party risk, often referred to as partner or supply chain risk, arises from the relationships and interactions between an organization and its business partners, suppliers, or vendors. This type of risk occurs when the actions or vulnerabilities of these external entities can directly impact the organization's security and operations. For instance, if a supplier experiences a data breach, it could expose sensitive information of the organization.

Third-Party Risk:
Third-party risk expands on second-party risk and involves potential threats associated with a broader network of external entities. This includes not only business partners and suppliers but also service providers, contractors, and any other third parties that the organization interacts with. Cybersecurity third-party risks can stem from these entities' cybersecurity practices, data handling, and other factors that may affect the organization's security posture.

Fourth-Party Risk:
Fourth-party risk is a relatively newer concept and relates to the risk associated with third-party relationships. It involves assessing the security practices and vulnerabilities of the vendors, partners, or service providers used by third parties with whom the organization has a direct relationship. In essence, it's the risk associated with your third party's third parties. Understanding fourth-party risk is important because the security of your third parties can indirectly impact your organization's security.

Now that we have it broken down. Next is to MeasureRISK - click here for more information.
0 Comments

Harnessing the Power of Microsoft Defender and Sentinel

9/7/2023

0 Comments

 
In today's digital landscape, organizations face a constant barrage of cyber threats, making robust cybersecurity measures a top priority. One effective approach to defending against these threats is the integration of Microsoft Defender for Endpoint (Defender) and Azure Sentinel into a comprehensive Extended Detection and Response (XDR) strategy. In this blog post, we will explore the power of Microsoft Defender and Sentinel for XDR and provide valuable configuration tips to help organizations maximize their cybersecurity defenses.

Understanding the Power of Microsoft Defender and Sentinel for XDR

1. **Real-time Threat Detection**: Microsoft Defender for Endpoint is a cutting-edge endpoint security solution that leverages artificial intelligence and machine learning to detect and respond to advanced threats in real-time. It provides deep insights into endpoint activities and helps identify malicious behavior.

2. **Centralized Data Collection**: Azure Sentinel, on the other hand, is Microsoft's cloud-native SIEM (Security Information and Event Management) solution. It collects and correlates data from various sources, including Defender, to provide a unified view of an organization's security posture.

3. **Seamless Integration**: The true power of Defender and Sentinel for XDR lies in their seamless integration. Security incidents detected by Defender can be sent to Sentinel for further investigation, analysis, and response. This integration enables a coordinated and holistic approach to threat detection and response.

Configuration Tips for Optimum Value

Now, let's delve into some configuration tips to harness the full potential of Microsoft Defender and Sentinel for XDR:

1. **Enable Defender Advanced Features**:
- Ensure that advanced features such as attack surface reduction rules, endpoint detection and response (EDR), and automatic investigation and remediation are enabled in Microsoft Defender for Endpoint.
- Regularly review and update security baselines to align with your organization's security policies.

2. **Fine-Tune Alert Policies**:
- Customize alert policies to match your organization's threat landscape. Focus on high-priority alerts and reduce noise by tuning policies.
- Leverage the Threat & Vulnerability Management dashboard in Defender to identify vulnerable systems and prioritize patching.

3. **Integration with Azure Sentinel**:
- Configure connectors in Azure Sentinel to ingest data from Microsoft Defender for Endpoint.
- Use built-in playbooks or create custom automation workflows to respond to incidents automatically.

4. **Advanced Hunting Queries**:
- Take advantage of Azure Sentinel's advanced hunting capabilities to proactively search for threats and unusual activities in your environment.
- Create custom KQL (Kusto Query Language) queries to extract meaningful insights from collected data.

5. **Continuous Monitoring**:
- Establish continuous monitoring practices by setting up scheduled queries and alerts in Azure Sentinel.
- Regularly review incidents, investigate false positives, and refine your detection rules.

6. **Incident Response Planning**:
- Develop a robust incident response plan that integrates both Defender and Sentinel.
- Conduct tabletop exercises to ensure your team is well-prepared to respond to security incidents effectively.

Conclusion

Microsoft Defender for Endpoint and Azure Sentinel, when configured effectively, offer a powerful XDR solution that can significantly enhance an organization's cybersecurity posture. By following these configuration tips and staying vigilant, organizations can harness the full power of these tools to detect, respond to, and mitigate cyber threats in a rapidly evolving digital landscape. Embracing the synergy between Defender and Sentinel is a key step toward a more secure future.

Conatct us today to learn more
0 Comments

    Categories

    All
    CMMC
    COMMUNITY
    TECHTIP

    Tom Brennan

    This is my blog, there are many like it but this one is mine. Enjoy.

    View my profile on LinkedIn

    BLOG Archives

    May 2025
    February 2025
    January 2025
    November 2024
    August 2024
    June 2024
    May 2024
    April 2024
    February 2024
    January 2024
    December 2023
    November 2023
    September 2023
    August 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    August 2022
    April 2022
    August 2021
    March 2021
    January 2021
    August 2020

    RSS Feed

Contact Us
🏢 ​New Jersey Headquarters
290 W Mt. Pleasant Ave, Suite 11309
Livingston, NJ 07039

☎️ 973-298-1160 | GPS Map
Client Portal
ManageIT Remote

​
© COPYRIGHT 2024. ALL RIGHTS RESERVED.
  • > About
    • Mission | People
    • Capabilities Statement
    • Blog
    • 800 lb Gorilla
    • Press & Events
    • Videos
    • Careers
    • Books & Tools
    • Referral Program
    • Portals > >
      • Client Portal
      • Staff Portal
  • > Assess
    • Framework Audit
    • AI Investigate
    • RED/BLUE TEAM
    • Continuous Testing
    • 365 Tenant Assessment
    • Industrial Controls
    • Digital Evidence
    • Table Top Exercises
  • > Train
    • Talent Acquisition
    • Threat Modeling
    • Virtual and Physcial
  • > Manage
    • Fractional CISO
    • 365 Protect
    • Vendor Risk Management
    • Managed Security Awareness
    • Physical Security
    • Custom Software
    • ContinuityXpert
    • Technology Support
  • > Industry
    • State and Local Gov.
    • Legal and Accounting Firms:
    • Financial Technology
    • Healthcare