Balancing Training and Technology Under a Tight Cyber Budget

Balancing Training and Technology Under a Tight Cyber Budget: A CISO’s PlanI will provide a simple, repeatable framework for how I would decide what to fund.First, use a threat-led, risk-based approach to map the most likely incidents(phishing/BEC, ransomware, lost devices, privilege misuse, cloud misconfig) to specificcontrols.Second, apply defense-in-depth principles, not redundancy. Each dollar should address…

Vulnerabilities and Protections in SCADA Systems

BLUF:Supervisory Control and Data Acquisition (SCADA) systems are vital to the operation ofcritical infrastructure globally, but their growing connectivity to open networks such asthe Internet has made them susceptible to large cybersecurity issues. The layered design,the machine interfaces, and network segmentation of SCADA functionality play a vitalpart in combatting these liabilities and engendering operational resiliency….

CIA Triad (confidentiality, Integrity, Availability)

What is CIA?A model used for designing and evaluating security controls. Think of this as yourfoundation in which everything else gets built off of. The Chai article describes the triad as a modelthat guides organizational InfoSec policies.ConfidentialityThis is to prevent the unauthorized disclosure of data. Examples include role-basedpermissions, file or folder permissions, encryption, or the…