Similar Posts
Presenting at TAG Cybersecurity – February 2020 Meeting
ByKayneFeatured Presentation: “Best practices for cyber security training programs” by Kayne McGladrey, CISSP Employees dread the meeting invitation that reads ‘Annual mandatory cyber security training in the break room at 1 PM Wednesday’. In this presentation, we’ll discuss best practices for creating a reality-based training program that encourages employee participation and builds organizational muscle memory for responding to active threats.
ISSA International Article of the Year for 2017: Lessons about Cloud Security from 1980s Horror Movies
ByKayneLessons about Cloud Security from 1980s Horror Movies | Kayne McGladrey – ISSA member, Puget Sound Chapter
Member Spotlight: Kayne McGladrey, Director Of Security And IT, Pensar Development
ByKayneUntil we change how we talk and think about cybersecurity, I fear it’s like the Alcoholics Anonymous definition of insanity: doing the same thing and expecting a different result.
Post Pandemic, Technologists Pose Secure Certification for Immunity
ByKayne“Businesses and organizations would need to … educate their workforce on how to validate that a certificate was correct,” he says. “And there would need to be a substantial educational investment to combat the inevitable phishing campaigns that’d spring up, such as fake websites to collect personally identifiable information and fake security alerts associated with these digital certificates.”
What Are the Implications of Meltdown and Spectre for IoT?
ByKayne“Patching is a reactive strategy, and there are a couple of challenges that have led us to the current situation. One of those challenges is that the market has rewarded companies that develop and produce products rapidly, and the market has shown a willingness to accept post-release patching as an acceptable trade-off. As a result, developers and architects are rewarded by their employers for producing code and architecture very quickly with less thought given to cybersecurity.
“The other significant challenge is that the cybersecurity community is generally homogenous. We have a diversity problem when just 11% of women work in cybersecurity. This lack of diversity in backgrounds and life experiences has influenced the analytic methodologies that are used to evaluate potential security issues with products. This lack of diversity of thought has led to the unfortunate set of expectations that breaches are inevitable, and this situation will continue until the cybersecurity industry does a better job of including diverse voices and opinions in the global conversation about security.”
Interview on Cheddar TV
ByKayneSkip to 1:10:00 for my live interview on Cheddar about Generation AI