Ambassador
Jeremy Smith
VP INFORMATION SECURITY OFFICER
United StatesVerified Community AmbassadorContent Jeremy is Following
How many users in your organization have access privileges beyond what they require?
All users
Some users
A few users
No users
Unsure
1.6k views
If your organization has been hit with a ransomware attack in the past, when was the attack(s) first initiated. Select all that apply.
Over the weekend (Saturday or Sunday)
During the night (Monday-Friday between 6pm and 8am)
During normal business hours (Monday-Friday between 8am and 6pm)
On or around a holiday (e.g., Christmas, Labor Day, etc.)
Unsure
1.2k views2 Upvotes
What are some of the key capabilities of your insider risk programs?
404 views1 Comment
I am interested in hearing if anyone has done a bake-off between Material Security and Abnormal and what the pluses and minus of each were.
74 views
I'm looking for recommendations for firms that do pen-testing - those that are well-regarded and respected. Specifically not looking for tools, or Testing-as-a-Service solutions. My research so far has come-up with Secureworks, Rapid7, Optiv, Coalfire, Blackhills, and Specterops. If you have any feedback on these, or suggestions on others, please let me know.
Jeremy SmithVP INFORMATION SECURITY OFFICER8 months ago
I use a company called EKCO - would highly recommend them. https://www.ek.co/We have used them for years and for external pen tests and also focussed application pen tests. They - like all other companies- use tools to ...read more
3.6k views1 Upvote4 Comments
Identification of "at risk" accounts based on user behavior analysis
Monitoring of volume of data upload/download to USBs and cloud
Communication with HR
UEBA, PAM and conditional access management