Category: Cybersecurity & Infosec

June 29th, 2022 by John

CornCon “Quad Cities Cybersecurity Conference” is returning in person on September 30 & October 1, 2022. To be held at RiverCenter convention center in downtown Davenport, Iowa, this year’s conference will include a Thursday CISO summit (TBD), two days full of great speakers, tutorials, villages and expo, as well has K12 activities on both Friday and Saturday. More details can be found on the conference website: https://corncon.net. (note that early bird pricing has been extended to July 15th)

Posted in Community, Cybersecurity & Infosec, Education, Events, Kids

June 29th, 2022 by John

https://www.forbes.com/sites/bobzukis/2022/06/27/rsa-2022-solutions-to-systemic-cyber-risk-are-emerging-but-its-early/?sh=518b6fbe1c42

Systemic risk is about the risk that exists between the parts of any complex system. This includes third-party vulnerabilities. Being able to understand if any third party introduces critical levels of systemic risk to the entire system through concentration risk is also a critical systemic cyber risk challenge.

Posted in Cybersecurity & Infosec, Risk Management

January 21st, 2022 by John

I was fortunate to be on a panel to discuss the Software Supply Chain with Richard Rushing, Bryan Hurd and Richard Greenberg (moderator) for the ISSA Los Angeles chapter on Wednesday (1/19/21). Click here to view the recording, https://www.youtube.com/watch?v=y3wqCc34tME.

Posted in Blog, Cybersecurity & Infosec, Presentations & Webinars, Resiliency, Risk Management, Supply Chain

January 20th, 2022 by John

Supply chain security can refer to suppliers who provide services, staffing, support, or who develop software/hardware. The supply chain is varied and different across industry segments and organizations. If you consider the development of applications or electronics, there may be a long list of companies who contribute to the final product. The longer the supply chain and the less visibility you have into (or ability to assess) each supplier, the higher the overall complexity and resulting risk to your organization.

Let’s consider the software that we use in our own organizations. There is a lot of it. Do you have a complete inventory of the software you have running on your endpoints, or supporting business processes? Having a granular software inventory and an approved enterprise application catalog is a starting point. The granular information you need includes: “Who owns and makes decisions about the application?” “Who supports and patches it?” “Who budgets for and pays for licenses?” “What is the application architecture and how does it communicate?” Having a central trusted software inventory (this may differ between desktops and servers) is a starting point. Read More

Posted in Blog, Cybersecurity & Infosec, Exploits & Attacks, Resiliency, Risk Management, Supply Chain

October 7th, 2019 by John

As power grid evolves, so must cybersecurity.

//cdn.iframe.ly/embed.js

Posted in Critical Infrastructure, Cybersecurity & Infosec, Exploits & Attacks, Governance, IoT, IIoT, ICS-SCADA

September 30th, 2019 by John

“The abundance of technology investments gives firms a false sense of confidence in their security posture. Their challenges reveal a different story,” said the report. Security executives currently employ a variety of tools and technologies to identify risks and test the effectiveness of their security controls. As a result, they are left with point-in-time assessments that require them to cobble together data from disparate systems to truly understand the organisation’s security posture. This approach is reactive, labour-intensive, and insufficient in scale, explained the report. [via CI Security 9/30/19]

Posted in Cybersecurity & Infosec

May 7th, 2019 by John

https://www.dhs.gov/sites/default/files/publications/national-critical-functions-overview-508.pdf

[via CI Security] “The National Critical Functions construct provides a risk management approach that focuses on better understanding the functions that an entity enables or to which it contributes, rather than focusing on a static sector-specific or asset world view. This more holistic approach is better at capturing cross-cutting risks and associated dependencies that may have cascading impact within and across sectors. It also allows for a new way to view criticality, which is linked to the specific parts of an entity that contribute to critical functions. By viewing risk through a functional lens, we can ultimately add resilience and harden systems across the critical infrastructure ecosystem in a more targeted, prioritized, and strategic manner.”

Posted in Critical Infrastructure, Cybersecurity & Infosec, Resiliency

April 23rd, 2019 by John

John D. Johnson

Every organization must face and deal with cyber risk associated with Internet of Things (IoT) devices connecting to other systems and the extended enterprise network. I had the privilege of leading a group of about 50 information security professionals in a Peer-to-Peer session at RSA Conference on March 6, 2019, and I learned that this problem is pervasive across all industries.  Read More

Posted in Cybersecurity & Infosec, IoT, IIoT, ICS-SCADA