New Tools for Today’s Modern Cybersecurity

The New York Department of Financial Services (DFS) Cybersecurity Symposium on March 29, included a presentation entitled “Modernizing Cybersecurity Supervision,” presented by Assistant Deputy Superintendent William Peterson. The presentation outlined new efforts by DFS to revamp its supervision process to address modern cybersecurity challenges and to better evaluate how companies can prepare for and respond to attacks. Mr. Peterson identified several new tools to provide DFS with a more informative starting point, as well as create a more collaborative environment with covered entities. Security ratings are useful in settings like the DFS evaluations because they measure large pools of data. This data also gives an outside-in viewpoint, which will combine with an inside-out viewpoint collected via a questionnaire process called the Cybersecurity and Information Technology Baseline Risk Questionnaire (CIBRQ). DFS regulated entities will be required to periodically complete the new CIBRQ questionnaire tool. By combining traditional exam data and incorporating…

0 Comments

Founder, Patrick Kelley, interviewed by NBC/11Alive

"My initial reaction was: 'they're doomed,'" cybersecurity expert Patrick Kelley, founder of Critical Path Security, said. Kelley said he was surprised to see funding for Atlanta Information Management drop since the 2018 ransomware attack, based on a report shared with the city's finance committee on March 30. "Most cybersecurity plans are built on a five-year maturity model," Kelley said. "We're not even four years after the recovery of the ransomware event that cost the city millions of dollars." Given limited resources, Kelley said local governments are already at a disadvantage compared to large corporations when it comes to technology funding. "They have to operate with the lowest amount of money that they can possibly get," Kelley said of the challenges, "And have to do the most that they can with it." Yet, he said resources and response time are critical. According to Kelley, it only takes five to six minutes…

Comments Off on Founder, Patrick Kelley, interviewed by NBC/11Alive

The Okta Breach: What You Should Be Doing

On March 22, 2022, the threat group LAPSUS$ announced the compromise of Okta. Okta is an enterprise-grade Multi-Factor and Identity and Access Management (IAM). Recently, the LAPSUS$ group has made statements of breaching high-value targets, but has provided very little evidence of being successful into those attacks. It is now known that the attack on Okta was successful and approximately 366 customers were impacted. Though the details of the attack are still quite limited, what we know is that this attack was likely successful due to phishing or the acquisition of credentials through the bribing of an internal employee. Regardless of the method, based on the screenshots shared by the attacker, it appears that a third-party support engineer's laptop was compromised and legitimate access was used. At this time, we recommend the following actions: Review Okta System logs for unusual "Reset Multifactor" events. Review Okta system logs for unusual "Reset…

Comments Off on The Okta Breach: What You Should Be Doing

Founder, Patrick Kelley, speaks at Ohio’s Electric Cooperative’s Winter Conference!

"Do not store The Business Continuity Plan and Disaster Recovery Plan on the server. If you are only reviewing the plan annually, you are already behind. Things move too quickly for annual review." Build Your Defenses Operations: Establish baseline and target security maturity. Establish baseline and target security posture. Review personnel capabilities and determine skill paths. Develop and provide standards and guidelines for secure application development and infrastructure requirements. Emerging Threats: Develop risk and threat models. Determine available tools in use or to be acquired. Threat Intelligence: Learn how to integrate and contribute. Vulnerability Management: Develop automation for the detection and remediation of new vulnerabilities. Incident Response: Review current IR procedures and update if needed. Define internal and external communication protocols and guidelines.

0 Comments