Home » 2016 » September

Monthly Archives: September 2016

Resistance is Futile; You Must Comply

personally identifiable information

No threat actor ever avoided attacking your system because you marked a control as compliant. Yet organizations today are spending ever increasing resources to remain compliant with a myriad of frameworks, including the National Institute of Standards and Technology’s (NIST) Risk Management Framework (RMF), International Standards Organization (ISO) frameworks, such as ISO 27001, and ISACA’s Control Objectives for Information and ...

Read More »

Hacking the Heartland (Part 3): Safeguarding Farming Data

farming3

Drive through any stretch of American farmland, and you’ll see miles of reinforced fencing that protects crops and keeps out unauthorized visitors. It’s clear that security is a high priority at these critical purveyors of the U.S. food supply — and, of course, that’s for good reason. However, in an increasingly data-centered world, U.S. farms and agricultural companies have rapidly ...

Read More »

Risk Management – From Paper to Reality

Risk management

So you have completed your security controls assessment. You have beautiful risk assessment reports, and a big beautiful plan of action and milestones (POA&M). Now what? You have to bring your plan to manage risk into reality. According to the Department of Homeland Security’s Office of Cybersecurity and Communications, if you stacked all of the paperwork generated by assessment and ...

Read More »

Hacking the Heartland (Part 2): Farming Intellectual Property

Traditional American Farm With Blue Sky

Having your trade secrets hacked is never a good thing, but there are certain areas within the U.S. economy where a hacked trade secret could lead way to an absolute disaster. One of those industries that many people don’t typically associate with highly sophisticated technology: agriculture. Nonetheless, the ag industry is currently a top concern in international cyber defense. Cyber ...

Read More »