When thinking about critical infrastructure we might think about airports, seaports, power grid, power plants and the like. The importance in protecting and securing this infrastructure is obvious. However, how to begin might be less clear. Supervisory control and data acquisition (SCADA) were developed to help and actualize this sort of protection. In an article…
Workplace Deviance in a Digital World
A lot has become available at our fingertips. Cyber technologies such as cell phones with internet applications make it simple for a person to spend more time on those phones that with their work. Some organizations may allow cell phone use in downtime but certain job function are supposed to take the full attention of…
How to Protect Availability as CISO
Nowadays ransomware is ravaging across multiple industries. As CISO of a publicly traded company I would ensure my engineers and staff install and maintain an anti-virus solution that has ransomware protection. Additionally, our team would have real-time redundant backups of our systems. We would have off site backups for a warm or cold swap as…
NIST Cybersecurity Framework
The NIST Cybersecurity Framework has many great benefits in the way of scalability, accessibility and deliverance. It can be implemented as a cybersecurity guidance and policy tool in any size organization. The concepts presented do not target any specific size or type of company. Additionally, it is formatted so that it can be easily followed….