The Infosec Archives 12.30.2021 - V4

The Infosec Archives 12.30.2021 - V4

Hey friends,

Welcome back to the 4th and last edition of Infosec Archives for 2021.

It’s that time of year again where some of us reflect on 2021 and start thinking about 2022 goals.

A recent poll I ran suggests sharing knowledge and helping others is a top theme of choice with getting a job or a new job in 2nd place.

It’s encouraging to see that community and supporting one another is still alive and kicking in the infosec world.

I’m personally very excited about community and look forward to sharing what we are building very soon!

And now... Let's?dive in?as they say. ??

?----------------------------------


News:??

LastPass users warned their master passwords are compromised

Many LastPass users report that their master passwords have been compromised after receiving email warnings that someone tried to use them to log into their accounts from unknown locations.

The email notifications also mention that the login attempts have been blocked because they were made from unfamiliar locations worldwide.

"Someone just used your master password to try to log in to your account from a device or location we didn't recognize," the login alerts warn.

https://www.bleepingcomputer.com/news/security/lastpass-users-warned-their-master-passwords-are-compromised/

?


Career Advice: ??

Justin Jones : IT Manager @Jacobs

Recruiters:

If you are actively searching for IT or Cybersecurity talent please comment or message me.

Candidates:

I'll post tomorrow a list of recruiters and openings.

The roles will be both clearance and non-cleared. Also remote and in-person.

Let's connect people to their new roles starting in 2022.

P.S. I do this almost once a month and several people land new roles ??



Infosec Wisdom: ??

#1 Brian Blakley: Information Security Leadership

Data flows like water throughout your entire organization – and beyond.

?Do you know…

-where it goes?

-who touches it?

-how it’s handled?

-why they have it?

-what they do with it?

?

Start with your most high value data.

Draw a picture and keep asking the questions above.

Keep your drawing simple and high-level at first, then continue to add detail.

Don’t make assumptions.

Don’t stop until the data stops flowing.

If you’re not shocked by where your data flows, then you’re not done yet.

Keep asking questions. Stay curious.

Because data is like water and it flows to nooks and crannies that you never knew existed.

----------------

#2 E.J. Hilbert: Practical Cyber and Security Consulting

For those of you looking to become NIST 800-171/CMMC 2 compliant, a gift for the New Year.

1. Stand up a Azure Gov instance

2. Set the instance as a portal to receive data from you clients and for them to download data from you

3. Enable internal Sharepoint access to portal for you internal team. (This Sharepoint site will become the workspace/Virtual Desktop)

4. Enable full logging on the portal and Sharepoint site

5. Enable file structuring (creation of folders) on the Sharepoint site

6. Set up access control for each "folder" Only team members working on a client engagement has access A PM or Team leader will add or remove people as needed

7. Lock down access to the Sharepoint site to only user machines using Win10 or above, with MFA enabled, with FIPS level encryption and with IPA's owned by your company or VPN controlled by your company

8. Establish policies and procedures with clients that all CUI data is only to be submitted/transferred/transacted via the portal. NO EMAIL.

9. Establish policies and procedures that only US citizens can work on CUI jobs, that all work is conducted in the Azure Gov Sharepoint and that no CUI is to be downloaded to user workstations.

10. Win a CUI job and use the system above.

My steps make it sound easy but it is not (I know) but if implemented fully this system should cover all the requirements for NIST 800-171 compliance moving forward (You'll have to move all your old CUI into the Gov world.

#Microsoft?should have the?#CUI?instance as a pre-built for all clients but they don't so your need an Azure Gov Engineer to build this out.

If you need help feel free to hit me up.

Happy New Year and a Prosperous 2022

----------------

?#3 *Bonus*

Gabriel Friedlander ? Wizer | Founder

No alt text provided for this image


Mentorship: ????

Jay Jay Davey: SOC Lead | SecOps & Incident Response Professional | Career Advisor & Mentor

“Cybersecurity isn't something you learn.

Multiple different disciplines are included; however, what you need to learn is relative to the role or path you wish to take.

Seeing "Cyber" courses is a worry; people use them as a be all end-all. They're merely primers, albeit very soft touches on the subjects included.

Be sure to take your studies further and fully understand the foundations required, don't rely on an all-in-one course. This approach will help address knowledge gaps and give you a good foundation when approaching technical interviews for junior/entry roles.”

?


#Cybersecurity Heroes Podcast: ???

?When I first started out on this podcasting journey, I was intimidated to be honest.

?1. How am I going to interview experts when I’m not an expert?

2. Will I do a good job interviewing?

3. Will people care to listen?


After 38 episodes and counting, here’s what I learnt.

1. The Cybersecurity folks that I met are the most welcoming and supportive bunch of people ive ever met

2. They don’t judge, they are just happy to help

3. They are extremely humble and don’t seek praise.

?

So, to all the past and future #cybersecurityheroes, thank you for your support both as leaders, practitioners, participants and listeners.

Oh, and we made it into the top 25% benchmark for performance against all podcast categories in only 9 months!

Here’s to another exciting year of great guests and more...

(stay tuned for some big news)

?

p.s

If you enjoy the show, we would love a rating or a review so more people like you can find it!

p.s.s

** Scroll to the bottom of the newsletter for the full catalogue of all the episodes to date for anybody who missed them and to pay tribute to all my wonderful guests. **


Meme of The Week ??

No alt text provided for this image

--------------------

That's a wrap for this week's Infosec Archives, see you again next year. ?? (sorry couldn’t help myself)

I wish you all a peaceful new year and a healthy, prosperous 2022!

Brendon

-----------------

Cybersecurity Heroes Podcast Archives: 2021 powered by IRONSCALES


Ep #1 Strengthening Your Strongest Security Asset: Your People

https://podcasts.apple.com/us/podcast/strengthening-the-weakest-security-link-your-people/id1559807252?i=1000516012443

https://open.spotify.com/episode/6dUj32VbvLdzLFT2n8fYb0?si=cab1ee5182b8450f

?

Ep#2 The Biggest Challenge in Cybersecurity

https://podcasts.apple.com/us/podcast/the-biggest-challenge-in-cybersecurity/id1559807252?i=1000517077015https://open.spotify.com/episode/2tLHqwkd9E8wwcxxJeeI2G?si=Jc9y5ofaQOKuNHA_dHZ5RA

?

Ep#3 How To Manage Cloud Migration

?https://podcasts.apple.com/us/podcast/how-to-manage-cloud-migration/id1559807252?i=1000517971694

https://open.spotify.com/episode/669kC713RNhjDsx6TkhaQA?si=15wKjwtLSAed_RXkWxM8EA


Ep#4 What You Should Know About The Changing Information Security Landscape

https://podcasts.apple.com/us/podcast/what-you-should-know-about-the-changing-information/id1559807252?i=1000518774571

https://open.spotify.com/episode/6lhQESOLJQAtWZAqLDXXu4

?

Ep#5 Ditch the Degree? What You Need to Land a Cyber Security Role

https://podcasts.apple.com/us/podcast/ditch-the-degree-what-you-need-to-land-a-cyber-security-role/id1559807252?i=1000520234615

https://open.spotify.com/episode/2458ApUFQhRKpXOy9Zlcte

?

#6 What Drives Cybersecurity in the Automotive & Manufacturing Industries?

https://podcasts.apple.com/us/podcast/what-drives-cybersecurity-in-the-automotive/id1559807252?i=1000521422386

https://open.spotify.com/episode/6X5O2SuYzDdD12IgCqSiHx?si=evrQ5F-dQpmSmqWRA2NQww

?

#7 Understanding OT Security & How It Differs from IT

https://podcasts.apple.com/us/podcast/understanding-ot-security-how-it-differs-from-it/id1559807252?i=1000522308773

https://open.spotify.com/episode/3pjc7AOD2QhHXzaaZqjV0p?si=bYxFfTbHQ1O3pDV0-OwWww

?

#8 Bringing Email Security to the Forefront

https://podcasts.apple.com/us/podcast/bringing-email-security-to-the-forefront/id1559807252?i=1000523107710

https://open.spotify.com/episode/2xHj20ayXzGQX4lNsBIR1C?si=CzzPr6TORZ-uOOG2LbAH0A

?

#9 Rethinking Cyber Education with Josh Mason

https://podcasts.apple.com/us/podcast/rethinking-cyber-education-with-josh-mason/id1559807252?i=1000523896448

https://open.spotify.com/episode/3KW5gyn8jptL3Tyv2oZucM?si=z64mcdfUS0mHkb0Jw8OGtw

?

#10 Phishing Incident Response From The Trenches

https://podcasts.apple.com/us/podcast/phishing-incident-response-from-the-trenches/id1559807252?i=1000524750118

https://open.spotify.com/episode/1vgxocrwR1YBK7t1L3T59F?si=4_WRmxSrTNeCGc-llZG9Jw

?

#11 How to Make Cybersecurity Culture Part of Company Culture

https://podcasts.apple.com/us/podcast/how-to-make-cybersecurity-culture-part-of-company-culture/id1559807252?i=1000525742435

https://open.spotify.com/episode/68hQcbZFWOXgs0MpYGh02N?si=8n6CUoPwReSvSqb6baL7cg

?

#12 Bringing Neglected Cybersecurity Basics to the Forefront

https://podcasts.apple.com/us/podcast/bringing-neglected-cybersecurity-basics-to-the-forefront/id1559807252?i=1000526591003

https://open.spotify.com/episode/2YgSaUC2eLykmDg3fyVNBP?si=C4n_VVYtRHmipK4AuyDtIA

?

#13 Never Trust, Always Verify: Why Synergy Six Degrees’ Kevin Bailey Believes Zero Trust is a Cybersecurity Must-Have

https://podcasts.apple.com/us/podcast/never-trust-always-verify-why-synergy-six-degrees-kevin/id1559807252?i=1000527344290

https://open.spotify.com/episode/6BUpNGpZmLak0TdhOhIkhk?si=TlKIrGkYS8GA68DE66vO8g

?

#14 Want to Combat Cybersecurity? Look for Insider Threats in Your Circle of Trust

https://podcasts.apple.com/us/podcast/want-to-combat-cybersecurity-look-for-insider-threats/id1559807252?i=1000528388819

https://open.spotify.com/episode/4T1EZlnqnLdTtnUNbe2zoO?si=fVlb2EeLQgm8NP5Gg4MNpQ

?

#15 Penetration Testing Explained: What they are and how to perform them to protect against cyber attacks

https://podcasts.apple.com/us/podcast/penetration-testing-explained-what-they-are-and-how/id1559807252?i=1000528981438

https://open.spotify.com/episode/1jX9cABgP7Q69CRboA6AQh?si=bYD_Rw46Sk6n1KYd2_kBNw?

?

#16 The 5-Phase Incident Response Playbook Against Cyber Attacks

https://podcasts.apple.com/us/podcast/the-5-phase-incident-response-playbook-against-cyber/id1559807252?i=1000529848321

https://open.spotify.com/episode/62s4ZKInTYcZAQiRXPiNDH?si=eWcsPEHZRbCNAFErLbonjw

?

#17 The 8 Steps to Building a Phishing Awareness Security Program

https://podcasts.apple.com/us/podcast/the-8-steps-to-building-a-phishing-awareness/id1559807252?i=1000530914995

https://open.spotify.com/episode/3XC7Jkfx5OBEQkiMzlBJdi?si=qeYYlSj_QL6MI2Xb6CiLiQ

?

#18 Why We’re Losing the War on Cybersecurity and How to Fix it

https://podcasts.apple.com/us/podcast/why-were-losing-the-war-on-cybersecurity-and-how-to-fix-it/id1559807252?i=1000531688287

https://open.spotify.com/episode/49NlmEp8bzbAuLpJFvtVCm?si=HpPtxIB5SMqFy4ZGqCJ_Qw

?

#19 How to Find Cybersecurity Products that Actually Work

https://podcasts.apple.com/us/podcast/how-to-find-cybersecurity-products-that-actually-work/id1559807252?i=1000532335588

https://open.spotify.com/episode/0uQYWKSUTnbjGwTbR77nP5?si=lMl_H9NPS4e9nWj3ih8JIg

?

#20 The 5 Laws of Cybersecurity and How to Follow Them

https://podcasts.apple.com/us/podcast/the-5-laws-of-cybersecurity-and-how-to-follow-them/id1559807252?i=1000533061157

https://open.spotify.com/episode/62s4ZKInTYcZAQiRXPiNDH?si=eWcsPEHZRbCNAFErLbonjw

?

#21 Managed Detection and Response: How it Could be the Next Essential Step in Your Security Arsenal

https://podcasts.apple.com/us/podcast/managed-detection-and-response-how-it-could-be-the/id1559807252?i=1000533957754

https://open.spotify.com/episode/4qasHyBRk6WT9cd1k61X3R?si=Qs2D9pIzQoq9yiRKF9tYXA

?

#22 How to Create Security Training That Sticks

https://podcasts.apple.com/us/podcast/how-to-create-security-training-that-sticks/id1559807252?i=1000534702011

https://open.spotify.com/episode/0kqwdqx4xbxnCrnNM99JGA?si=Q39vLIHjQGyOKFkTptVVtA

?

#23 How to Select a New Cybersecurity Tool or MSSP

https://podcasts.apple.com/us/podcast/how-to-select-a-new-cybersecurity-tool-or-mssp/id1559807252?i=1000535257503

https://open.spotify.com/episode/7gOb3r3ogUWeLOvUga8mI9?si=YDZ4fHydQ6aGQ5KKz5bWMQ

?

#24 How to Prepare for Ransomware Attacks

https://podcasts.apple.com/us/podcast/how-to-prepare-for-ransomware-attacks/id1559807252?i=1000536908029

https://open.spotify.com/episode/5wBPWrzYBgxoQC2c8ahGPa?si=hb0MfIOjQW6MoqlOY5mvfA

?

#25 Apply Cybersecurity Fundamentals to the Modern World

https://podcasts.apple.com/us/podcast/apply-cybersecurity-fundamentals-to-the-modern-world/id1559807252?i=1000537661895

https://open.spotify.com/episode/0U1NRcV2JSfzTVTDyaMHm8?si=FKsk91r9QnSxojef8tbIXg

?

#26 Why You Should Use the NIST Framework to Protect Your Business

https://podcasts.apple.com/us/podcast/why-you-should-use-the-nist-framework-to-protect-your/id1559807252?i=1000538383814

https://open.spotify.com/episode/1q8EWJiBIDgnd5p0eZFsfT?si=6OVoEYZsTJ6E67wt6OHgaw

?

#27 How to Build an Effective Intelligence Analysis Program

https://podcasts.apple.com/us/podcast/how-to-build-an-effective-intelligence-analysis-program/id1559807252?i=1000539175623

https://open.spotify.com/episode/4BdUrux5Gcb2AbIloSfeM9?si=Ml0kazSQSI6xu74x7yRJZw

?

#28 How to Reinforce Your Cybersecurity Framework

https://podcasts.apple.com/us/podcast/how-to-reinforce-your-cybersecurity-framework/id1559807252?i=1000539823330

https://open.spotify.com/episode/0lUeTBoJXyLeJDdbkuXlfe?si=ao5f__EgRZ-CqLOVXriw_g

?

#29 How to Use BAS to Find and Fix Cybersecurity Vulnerabilities

https://podcasts.apple.com/us/podcast/how-to-use-bas-to-find-and-fix-cybersecurity/id1559807252?i=1000540625955

https://open.spotify.com/episode/5Z94nPYPY3JW2nIQHQl5nZ?si=SE-ddGMTQSm7xCDa81jiZw

?

#30 Breaking Down The Gartner Market Guide for Email Security 2021

https://podcasts.apple.com/us/podcast/breaking-down-the-gartner-market-guide-for-email/id1559807252?i=1000541271734

https://open.spotify.com/episode/0rl1142Okjb4eYgu3UzIHr?si=0phRG032RZyIFLagTjWtlw

?

#31 CIO Insights on Balancing Revenue, Security and Service

https://podcasts.apple.com/us/podcast/cio-insights-on-balancing-revenue-security-and-service/id1559807252?i=1000542123225

https://open.spotify.com/episode/7DGpGev6JpVdGnseW4nZP0?si=9P0XIHcSR2q-JcIPbBq5Ng

?

#32 How to Keep Your Business Information Confidential & Safe

https://podcasts.apple.com/us/podcast/how-to-keep-your-business-information-confidential-safe/id1559807252?i=1000542838764

https://open.spotify.com/episode/7GqyZBvTnNHZL2Vnb4EBKn?si=F6DpVu88TjOVv_a89bwXyg

?

#33 Don't Underestimate the Human Element in Your Threat Intelligence Program

https://podcasts.apple.com/us/podcast/dont-underestimate-the-human-element-in-your-threat/id1559807252?i=1000543478029

https://open.spotify.com/episode/076OCohKNWsqJmnvbXEF4i?si=gnH5LUCRRKm_oMQ39OwS1w

?

#34 Why Vulnerability Management is a Key Pillar in Your Cybersecurity Program

https://podcasts.apple.com/us/podcast/why-vulnerability-management-is-a-key-pillar-in/id1559807252?i=1000544207437

https://open.spotify.com/episode/55MbPhVfC0dIMs5vUMmY8B?si=Z1G4FdfUTk-ShcOzFL0SOQ

?

#35 What's Trending in Cybersecurity and How to Build a Successful Career

https://podcasts.apple.com/us/podcast/whats-trending-in-cybersecurity-and-how-to-build/id1559807252?i=1000544920581

https://open.spotify.com/episode/4HZyUHoSqqWJHqkgSSrZ03?si=xbB7-OFhRiqrpHnWx0VN1A

?

#36 *Bonus* Log4J: What You Need to Know and How To Respond

https://podcasts.apple.com/us/podcast/bonus-log4j-what-you-need-to-know-and-how-to-respond/id1559807252?i=1000545294047

https://open.spotify.com/episode/0lU99xWzD6TaubuwmLGshO?si=ReNgKWQ_QhW6m-bHFndIzw

?

#37 Build A Legacy That Fulfils The Soul

https://podcasts.apple.com/us/podcast/build-a-legacy-that-fulfils-the-soul/id1559807252?i=1000545638954

https://open.spotify.com/episode/3JtJ9cU8S11Po0Drf1RHu6?si=tI7wyMD_QbKnNYSFwr68pg

?

#38 What We Can Learn From Nigerian Cybersecurity Culture

https://podcasts.apple.com/us/podcast/what-we-can-learn-from-nigerian-cybersecurity-culture/id1559807252?i=1000546300180

https://open.spotify.com/episode/4dBhg0pBdef1ePKpns1vSi

----------------------------?

We’re stronger together.

Keep connected with Cyber Security Heroes at Apple Podcasts, Spotify, Stitcher and Google Podcast.

Parker Brissette

Builder of cool forts | vCISO | Trusted cybersecurity advisor | Serving the cybersecurity community | GRC Expert

3 年

You’re doing some great work Brendon. I love the new newsletter and am building my own now. Do you have a breakdown of the equipment you use for your podcast?

回复
David S.

Senior Technology Leader Focused on Strategic IT, Systems Architecture, & Cyber Security, Developing Detailed Solutions for Clients while Optimizing Business Growth

3 年

Thank you for sharing and helping Brendon it is greatly appreciated! Let the new year be healthy, happy and prosperous for all.

Raffi Jamgotchian

Empowering Alternative Asset Managers to strengthen cybersecurity, protect financial data, and leverage IT for a competitive edge | Trusted partner to safeguard your success | #1 Amazon Best Seller

3 年

Happy New Year Brendon!

Nick Espinosa

Chief Security Fanatic | CISO | Speaker | Columnist | Author | Radio Host | Board Member | Forbes Tech Council | TEDx | Canadian-American

3 年

Thanks for having me on your podcast! I had a great time!!

Zack Schuler

Executive Chairman of the Board | Founder/Former CEO | NINJIO

3 年

Thanks for all you do Brendon!

要查看或添加评论,请登录

?? Brendon Rod ??的更多文章

  • The Infosec Archives 04.22.22 V20

    The Infosec Archives 04.22.22 V20

    Hey friends, Welcome back to the Infosec Archives volume 20 ?????? Thank you again to all the contributors that make…

    12 条评论
  • Happy 1st Birthday Cyber Security Heroes ????????♂???

    Happy 1st Birthday Cyber Security Heroes ????????♂???

    Welcome to part 1 of our "Best of" Montage of Cybersecurity Heroes Podcast 2021. We hope you enjoy and thank you again…

    4 条评论
  • The Infosec Archives 04.15.22 V19

    The Infosec Archives 04.15.22 V19

    Hey friends, Welcome back to the Infosec Archives volume 19 ?????? We have some catching up to do! A lot happens in 2…

    2 条评论
  • The Infosec Archives 04.01.22 V18

    The Infosec Archives 04.01.22 V18

    Hey friends, Welcome back to the Infosec Archives volume 18 ?????? Can you believe it's already April?? One quarter…

    5 条评论
  • The Infosec Archives 03.25.22 V17

    The Infosec Archives 03.25.22 V17

    Hey friends, Welcome back to the Infosec Archives volume 17 ?????? A lot to unpack this week ??, hint hint..

    5 条评论
  • The Infosec Archives 03.18.22 V16

    The Infosec Archives 03.18.22 V16

    Hey friends, Welcome back to the Infosec Archives volume 16 ?????? Thank you again to all the contributors that make…

    10 条评论
  • The Infosec Archives 03.11.22 V15

    The Infosec Archives 03.11.22 V15

    Hey friends, Welcome back to the Infosec Archives volume 15 ?? Last week i was at the hairdresser. While she was…

  • The Infosec Archives 03.04.22 V14

    The Infosec Archives 03.04.22 V14

    Hey friends, Welcome back to the Infosec Archives volume 14 ?????? For all the criticisms of social media, now is the…

    13 条评论
  • The Infosec Archives 02.25.22 V13

    The Infosec Archives 02.25.22 V13

    Hey friends, Welcome back to the Infosec Archives volume 13 ?? Before we get started, I just want to say my thoughts go…

    8 条评论
  • The Infosec Archives 02.18.22 V12

    The Infosec Archives 02.18.22 V12

    Hey friends, Welcome back to the Infosec Archives volume 12 ?? While love is still hopefully in the air ??, no better…

    6 条评论

社区洞察

其他会员也浏览了