NJBIZ is proud to introduce the inaugural recipients of the Veterans in Business awards.
Created by NJBIZ Associate Publisher and General Manager AnnMarie Karczmit in honor of her late father, who served in the Korean war, this new program recognizes veterans who are making a significant impact on New Jersey business as well as continuing to give back to their community.
This year’s 41 honorees served across the United States’ military branches, including the Air Force, Air National Guard, Army, Marines, Navy and Coast Guard.
The judges for this year’s awards – who are all military veterans themselves – were: Dominick Belfiore, vice president business banking relationship manager, M&T Bank; Eddie Condello, vice president, team leader and commercial lending officer, Columbia Bank; and Schone Malliet, CEO and president, Winter4Kids.
Please join us for a virtual awards ceremony at 8:30 a.m. Nov. 7 to honor these individuals. Registration information will be available on the event page.
NJBIZ will also recognize the honorees in a special section included in the Nov. 20 issue of NJBIZ.
For sponsorship opportunities, please contact Karczmit at firstname.lastname@example.org.
Congratulations to the 2023 Veterans in Business honorees! George Akins, director of clinical pastoral services education and pastoral care
George Akins, director of clinical pastoral services education and pastoral care
Hackensack Meridian Health
Eric Basek, chief operations officer
Tom Brennan, ethical hacker
Proactive Risk Inc.
Alyza Brevard-Rodriguez, CEO and founder
SW3AT Wellness x The Other Side Dispensary
William Brown, president
Veteran Alumni of Rutgers University and Navy SEAL Foundation
JP Buss, managing partner
Ronald Campione, senior council
Jeff Cantor, CEO
NJ State Veterans Chamber of Commerce
Joseph Chinnici, banking center manager
Dan Conley, active angel investor
Angels + LifeSci Investors Network, NJAngels.net
Francisco Cortes, president and co-founder
NJ State Veterans Chamber of Commerce
Brett D’Alessandro, president
Backpacks For Life
Dennis Devery, vice president for enrollment management
Thomas Edison State University
Russell DiNardo, president and founder
Michael Ferraro, chief career door opener
Bridging the Gap for Veterans
Andrew Frazier, founder
Small Business Pro University
Porfirio Garcia, director of marketing
Greater Elizabeth Chamber of Commerce / Elizabeth Tourism
Michael Griffinger, senior director (retired)
John Hoffmann, certified public accountant
Independence Financial Services LLC
Cindy Jebb, president
Ramapo College of New Jersey
Joshua King, senior vice president, Supply Chain and Strategic Projects
American Water Works Co.
Michael Lafferty, general manager
Recycling Management Resources
Ryan Leonard, CEO
NJF Worldwide LLC
Oliver Lewis Jr., executive vice president, head of commercial banking
Jack Licata, president
Fast Bags Corp.
Jonathan Loane, vice president, Finance, Global MedTech Supply Chain
Johnson & Johnson
Lance Lopez Sr., project manager, Veterans and Community Recruitment
New Jersey Manufacturing Extension Program (NJMEP)
Christopher Manente, founding executive director
Rutgers Center for Adult Autism Services
James Marshmon, director, Student Development and Campus Life
Antonio Martinez, president and CEO
Renaissance Global Services LLC
Cathy McBarnette-Neilley, founder and president
Spin Doctor Laundromats LLC
John McCarthy, partner
Schenck, Price, Smith & King LLP
Robert McGowan, chief operating and finance officer
Chiesa Shahinian & Giantomasi PC
Keith McWha, partner
Lerner David LLP
Kevin O’Connor, chair, Business Litigation; co-chair, Labor and Employment
Peckar & Abramson PC
John Prutting, veterans outreach coordinator
Angelic Health Hospice and Palliative Care
Brendan Rezny, senior vice president, retail regional manager
Steven Robles, vice president
Tom Scazzafavo, partner
David Van Bever, executive director, Environmental and Transportation Services
Andrew Wood, chief financial officer
APi Group Inc./J. Fletcher Creamer & Son Inc.
In today's digital landscape, cybersecurity is of paramount importance for organizations across all industries. Despite extensive investments in advanced security technologies, a company's employees can be a significant vulnerability. Some employees may inadvertently put their organization at risk by clicking on phishing links, falling for scams, or unknowingly downloading malware. While these actions can expose an organization to potential threats, it is essential for management to address these issues with a constructive and proactive approach.
Identifying the Problem
The first step in managing employees who are cybersecurity liabilities is to recognize the problem. Some individuals may not fully understand the consequences of their actions or the various techniques used by cybercriminals to exploit vulnerabilities. It is crucial to approach this issue with empathy and understand that not everyone has the same level of cybersecurity knowledge.
Creating a Culture of Cybersecurity
Fostering a culture of cybersecurity awareness is essential for any organization. Management should implement regular training sessions and workshops to educate employees about the latest cybersecurity threats, best practices, and safe online behaviors. These sessions should be interactive, engaging, and tailored to suit the diverse learning styles of the workforce.
Encouraging Reporting and Learning from Mistakes
To address the issue effectively, it is essential to create an environment where employees feel comfortable reporting potential cybersecurity incidents or their own mistakes. This will help management identify problem areas and offer personalized guidance to individuals who need it. Promoting a blame-free culture will encourage employees to be more proactive in their cybersecurity practices.
Customizing Training Programs
Not all employees have the same level of technical expertise or knowledge when it comes to cybersecurity. By customizing training programs based on individual roles and responsibilities, management can ensure that employees receive targeted and relevant education. Some employees may need more hands-on training, while others might benefit from online resources and simulations.
Incentivizing Good Cybersecurity Practices
Positive reinforcement can be a powerful motivator. Management can create incentives for employees who consistently display good cybersecurity practices. Recognizing and rewarding employees who report potential threats, complete cybersecurity training, or contribute to improving the organization's security posture will encourage others to follow suit.
Collaborating with IT and Security Teams
A strong collaboration between management, IT, and security teams is crucial in addressing cybersecurity concerns. These teams can work together to identify common weak points and develop targeted solutions to enhance the organization's overall security measures. By understanding the patterns of employee vulnerabilities, IT and security teams can focus on implementing specific technical controls and threat detection mechanisms.
Balancing Strengths and Weaknesses
An employee's value to the organization should not be solely based on their cybersecurity knowledge. While a lack of cybersecurity awareness can be concerning, it should be balanced against their strengths in other areas. If an employee excels in their core responsibilities and demonstrates dedication and commitment, management should consider providing additional support and resources to improve their cybersecurity know-how.
Managing employees who pose cybersecurity liabilities requires a combination of understanding, education, and collaboration. By creating a culture of cybersecurity awareness, customizing training programs, and incentivizing good practices, organizations can significantly reduce the risk of cyber threats. Additionally, strong collaboration between management, IT, and security teams is vital in implementing comprehensive cybersecurity strategies.
While cybersecurity awareness is essential for all employees, it is equally crucial to acknowledge an individual's overall contributions to the organization. With a proactive and supportive approach, management can work with employees to improve their cybersecurity know-how, ensuring a safer digital environment for the entire organization.
A source of confusion for many is the defined summary of risk types. Below is a summary to help you better classify it when speaking to it internally or externally.
First-party risk, also known as internal risk, involves threats that originate from within the organization itself. These risks typically result from the organization's own actions, decisions, or internal processes. Examples of first-party risks in cybersecurity include employee errors, insider threats, and inadequate security policies or practices.
Second-party risk, often referred to as partner or supply chain risk, arises from the relationships and interactions between an organization and its business partners, suppliers, or vendors. This type of risk occurs when the actions or vulnerabilities of these external entities can directly impact the organization's security and operations. For instance, if a supplier experiences a data breach, it could expose sensitive information of the organization.
Third-party risk expands on second-party risk and involves potential threats associated with a broader network of external entities. This includes not only business partners and suppliers but also service providers, contractors, and any other third parties that the organization interacts with. Cybersecurity third-party risks can stem from these entities' cybersecurity practices, data handling, and other factors that may affect the organization's security posture.
Fourth-party risk is a relatively newer concept and relates to the risk associated with third-party relationships. It involves assessing the security practices and vulnerabilities of the vendors, partners, or service providers used by third parties with whom the organization has a direct relationship. In essence, it's the risk associated with your third party's third parties. Understanding fourth-party risk is important because the security of your third parties can indirectly impact your organization's security.
Now that we have it broken down. Next is to MeasureRISK - click here for more information.
In today's digital landscape, organizations face a constant barrage of cyber threats, making robust cybersecurity measures a top priority. One effective approach to defending against these threats is the integration of Microsoft Defender for Endpoint (Defender) and Azure Sentinel into a comprehensive Extended Detection and Response (XDR) strategy. In this blog post, we will explore the power of Microsoft Defender and Sentinel for XDR and provide valuable configuration tips to help organizations maximize their cybersecurity defenses.
Understanding the Power of Microsoft Defender and Sentinel for XDR
1. **Real-time Threat Detection**: Microsoft Defender for Endpoint is a cutting-edge endpoint security solution that leverages artificial intelligence and machine learning to detect and respond to advanced threats in real-time. It provides deep insights into endpoint activities and helps identify malicious behavior.
2. **Centralized Data Collection**: Azure Sentinel, on the other hand, is Microsoft's cloud-native SIEM (Security Information and Event Management) solution. It collects and correlates data from various sources, including Defender, to provide a unified view of an organization's security posture.
3. **Seamless Integration**: The true power of Defender and Sentinel for XDR lies in their seamless integration. Security incidents detected by Defender can be sent to Sentinel for further investigation, analysis, and response. This integration enables a coordinated and holistic approach to threat detection and response.
Configuration Tips for Optimum Value
Now, let's delve into some configuration tips to harness the full potential of Microsoft Defender and Sentinel for XDR:
1. **Enable Defender Advanced Features**:
- Ensure that advanced features such as attack surface reduction rules, endpoint detection and response (EDR), and automatic investigation and remediation are enabled in Microsoft Defender for Endpoint.
- Regularly review and update security baselines to align with your organization's security policies.
2. **Fine-Tune Alert Policies**:
- Customize alert policies to match your organization's threat landscape. Focus on high-priority alerts and reduce noise by tuning policies.
- Leverage the Threat & Vulnerability Management dashboard in Defender to identify vulnerable systems and prioritize patching.
3. **Integration with Azure Sentinel**:
- Configure connectors in Azure Sentinel to ingest data from Microsoft Defender for Endpoint.
- Use built-in playbooks or create custom automation workflows to respond to incidents automatically.
4. **Advanced Hunting Queries**:
- Take advantage of Azure Sentinel's advanced hunting capabilities to proactively search for threats and unusual activities in your environment.
- Create custom KQL (Kusto Query Language) queries to extract meaningful insights from collected data.
5. **Continuous Monitoring**:
- Establish continuous monitoring practices by setting up scheduled queries and alerts in Azure Sentinel.
- Regularly review incidents, investigate false positives, and refine your detection rules.
6. **Incident Response Planning**:
- Develop a robust incident response plan that integrates both Defender and Sentinel.
- Conduct tabletop exercises to ensure your team is well-prepared to respond to security incidents effectively.
Microsoft Defender for Endpoint and Azure Sentinel, when configured effectively, offer a powerful XDR solution that can significantly enhance an organization's cybersecurity posture. By following these configuration tips and staying vigilant, organizations can harness the full power of these tools to detect, respond to, and mitigate cyber threats in a rapidly evolving digital landscape. Embracing the synergy between Defender and Sentinel is a key step toward a more secure future.
Conatct us today to learn more
I was asked to write a basic information security policy for my veterinarian office who is concerned about basic business hygiene came out pretty good... so I am sharing here for all those that help keep our pets healthy..
Version 1.0 – WoofWoof Edition
Welcome to our veterinary clinic's Pawsitively Secure Information Security Policy! Just as we care for our furry friends, it's time to ensure the safety of our digital den. Remember, a safe cyber habitat keeps tails wagging and whiskers twitching!
Section 1: Kibble-Proof Passwords
Just like hiding your treats, protect your passwords! Create strong, unique passwords for your accounts. Mixing uppercase, lowercase, numbers, and special characters is like giving hackers a puzzle they can't solve.
Section 2: Feline-Proof Phishing Defense
Beware of cyber-cats! If an email seems fishy, don't bite the bait. Verify suspicious links and don't give out personal info. Our clinic doesn't need a catfish in the network!
Section 3: Guard-Dogged Devices
Your devices are like watchdogs – they keep an eye on your data. Lock screens, guard tablets, and leash your laptops when not in use. Prevent unauthorized squirrels from digging up sensitive data.
Section 4: Litterbox Clean-Up (Data Disposal)
Dispose of data responsibly. Just as you scoop out the litterbox, shred or delete sensitive files when they're no longer needed. No digging up old bones here!
Section 5: Tail-Wagging Updates
Keep your software updated like a wagging tail. Regular updates fix vulnerabilities and bugs – think of them as obedience training for your apps!
Section 6: Fetching Firewall Defense
Our clinic's firewall is like a sturdy fence – it keeps out unwelcome visitors. Don't disable it, or cyber-critters might sneak in and chew on our digital shoes.
Section 7: Lap-Dogged Laptop Security
If you're a mobile hound, secure your laptop! Don't leave it in hot cars or tempting dog parks. It's not just about biscuits – protect your data from thieves!
Section 8: Virtual Private Playpen (VPN)
If you're working from afar, use a VPN for a private playpen. It encrypts your data, making it as secure as a puppy cuddle.
Section 9: Guarding the Treat Jar (Admin Access)
Admin access is like the treat jar – only for trusted handlers. Don't share your admin keys, or else you might find rogue raccoons in the system!
Section 10: Incident Flea-Control Plan
In case of a cyber-flea infestation (a breach), report it immediately! We'll take action to scrub away those pesky bugs and keep our digital domain sparkling.
Remember, just as you protect your furry pals, safeguarding our digital domain keeps our clinic running smoothly. Thanks for being a part of our Pawsitively Secure team – where cybersecurity and pet care collide in the most tail-wagging way!
By following these guidelines, you'll help us maintain a safe and secure cyber-environment for all our four-legged and two-legged friends. Keep up the good work, and let's keep those cyber-paws off our data and tails high! 🐾🐶🐱🦔🐾
The NIST Cybersecurity Framework (CSF) provides a structured approach to assess an organization's cybersecurity posture. Here's a step-by-step guide to conducting a cyber assessment using the NIST CSF Framework:
To learn more about our MeasureRISK service contact us today
Dentists and healthcare professionals, like other businesses, need to protect sensitive patient data and comply with industry-specific regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States. They often utilize various non-legal cybersecurity services from specialized service providers to ensure the security and privacy of their patients' data and maintain compliance. Some of the common cybersecurity services utilized by dentists and healthcare professionals include:
Conducting a comprehensive cyber security penetration test assessment for a commercial business involves asking a wide range of questions to ensure that all potential vulnerabilities and weaknesses are identified and addressed. Here are some key questions to ask when conducting a penetration test assessment for a commercial business:
If you would like to measure your security we invite you to learn more about CATSCAN
Threat modeling is a process of identifying and analyzing potential security threats to a system or application. Here is a general process for threat modeling a custom web application connected to the internet:
For more information on Threat Modeling, contact us.
A data breach coach, also known as a breach response coach or cyber incident coach, is a specialized professional who provides guidance and support to organizations that have experienced a data breach. The primary purpose and function of a data breach coach are to help organizations respond to data breaches in a timely, effective, and efficient manner, minimizing the potential damage and protecting the organization's reputation.
Here is how a data breach coach can help you before, during, and after a data breach:
Before a data breach: