The Infosec Archives 12.30.2021 - V4
?? Brendon Rod ??
IAM Resilience Evangelist ?? | Startup Afficionado ?? | Go-to-market Architect ??
Hey friends,
Welcome back to the 4th and last edition of Infosec Archives for 2021.
It’s that time of year again where some of us reflect on 2021 and start thinking about 2022 goals.
A recent poll I ran suggests sharing knowledge and helping others is a top theme of choice with getting a job or a new job in 2nd place.
It’s encouraging to see that community and supporting one another is still alive and kicking in the infosec world.
I’m personally very excited about community and look forward to sharing what we are building very soon!
And now... Let's?dive in?as they say. ??
?----------------------------------
News:??
LastPass users warned their master passwords are compromised
Many LastPass users report that their master passwords have been compromised after receiving email warnings that someone tried to use them to log into their accounts from unknown locations.
The email notifications also mention that the login attempts have been blocked because they were made from unfamiliar locations worldwide.
"Someone just used your master password to try to log in to your account from a device or location we didn't recognize," the login alerts warn.
?
Career Advice: ??
Recruiters:
If you are actively searching for IT or Cybersecurity talent please comment or message me.
Candidates:
I'll post tomorrow a list of recruiters and openings.
The roles will be both clearance and non-cleared. Also remote and in-person.
Let's connect people to their new roles starting in 2022.
P.S. I do this almost once a month and several people land new roles ??
Infosec Wisdom: ??
Data flows like water throughout your entire organization – and beyond.
?Do you know…
-where it goes?
-who touches it?
-how it’s handled?
-why they have it?
-what they do with it?
?
Start with your most high value data.
Draw a picture and keep asking the questions above.
Keep your drawing simple and high-level at first, then continue to add detail.
Don’t make assumptions.
Don’t stop until the data stops flowing.
If you’re not shocked by where your data flows, then you’re not done yet.
Keep asking questions. Stay curious.
Because data is like water and it flows to nooks and crannies that you never knew existed.
----------------
For those of you looking to become NIST 800-171/CMMC 2 compliant, a gift for the New Year.
1. Stand up a Azure Gov instance
2. Set the instance as a portal to receive data from you clients and for them to download data from you
3. Enable internal Sharepoint access to portal for you internal team. (This Sharepoint site will become the workspace/Virtual Desktop)
4. Enable full logging on the portal and Sharepoint site
5. Enable file structuring (creation of folders) on the Sharepoint site
6. Set up access control for each "folder" Only team members working on a client engagement has access A PM or Team leader will add or remove people as needed
7. Lock down access to the Sharepoint site to only user machines using Win10 or above, with MFA enabled, with FIPS level encryption and with IPA's owned by your company or VPN controlled by your company
8. Establish policies and procedures with clients that all CUI data is only to be submitted/transferred/transacted via the portal. NO EMAIL.
9. Establish policies and procedures that only US citizens can work on CUI jobs, that all work is conducted in the Azure Gov Sharepoint and that no CUI is to be downloaded to user workstations.
10. Win a CUI job and use the system above.
My steps make it sound easy but it is not (I know) but if implemented fully this system should cover all the requirements for NIST 800-171 compliance moving forward (You'll have to move all your old CUI into the Gov world.
#Microsoft?should have the?#CUI?instance as a pre-built for all clients but they don't so your need an Azure Gov Engineer to build this out.
If you need help feel free to hit me up.
Happy New Year and a Prosperous 2022
----------------
?#3 *Bonus*
Mentorship: ????
“Cybersecurity isn't something you learn.
Multiple different disciplines are included; however, what you need to learn is relative to the role or path you wish to take.
Seeing "Cyber" courses is a worry; people use them as a be all end-all. They're merely primers, albeit very soft touches on the subjects included.
Be sure to take your studies further and fully understand the foundations required, don't rely on an all-in-one course. This approach will help address knowledge gaps and give you a good foundation when approaching technical interviews for junior/entry roles.”
?
#Cybersecurity Heroes Podcast: ???
?When I first started out on this podcasting journey, I was intimidated to be honest.
?1. How am I going to interview experts when I’m not an expert?
2. Will I do a good job interviewing?
3. Will people care to listen?
After 38 episodes and counting, here’s what I learnt.
1. The Cybersecurity folks that I met are the most welcoming and supportive bunch of people ive ever met
2. They don’t judge, they are just happy to help
3. They are extremely humble and don’t seek praise.
?
So, to all the past and future #cybersecurityheroes, thank you for your support both as leaders, practitioners, participants and listeners.
Oh, and we made it into the top 25% benchmark for performance against all podcast categories in only 9 months!
Here’s to another exciting year of great guests and more...
(stay tuned for some big news)
?
p.s
If you enjoy the show, we would love a rating or a review so more people like you can find it!
p.s.s
** Scroll to the bottom of the newsletter for the full catalogue of all the episodes to date for anybody who missed them and to pay tribute to all my wonderful guests. **
Meme of The Week ??
--------------------
That's a wrap for this week's Infosec Archives, see you again next year. ?? (sorry couldn’t help myself)
I wish you all a peaceful new year and a healthy, prosperous 2022!
Brendon
-----------------
Cybersecurity Heroes Podcast Archives: 2021 powered by IRONSCALES
Ep #1 Strengthening Your Strongest Security Asset: Your People
?
Ep#2 The Biggest Challenge in Cybersecurity
https://podcasts.apple.com/us/podcast/the-biggest-challenge-in-cybersecurity/id1559807252?i=1000517077015https://open.spotify.com/episode/2tLHqwkd9E8wwcxxJeeI2G?si=Jc9y5ofaQOKuNHA_dHZ5RA
?
Ep#3 How To Manage Cloud Migration
Ep#4 What You Should Know About The Changing Information Security Landscape
?
Ep#5 Ditch the Degree? What You Need to Land a Cyber Security Role
?
#6 What Drives Cybersecurity in the Automotive & Manufacturing Industries?
?
领英推荐
#7 Understanding OT Security & How It Differs from IT
?
#8 Bringing Email Security to the Forefront
?
#9 Rethinking Cyber Education with Josh Mason
?
#10 Phishing Incident Response From The Trenches
?
#11 How to Make Cybersecurity Culture Part of Company Culture
?
#12 Bringing Neglected Cybersecurity Basics to the Forefront
?
#13 Never Trust, Always Verify: Why Synergy Six Degrees’ Kevin Bailey Believes Zero Trust is a Cybersecurity Must-Have
?
#14 Want to Combat Cybersecurity? Look for Insider Threats in Your Circle of Trust
?
#15 Penetration Testing Explained: What they are and how to perform them to protect against cyber attacks
?
#16 The 5-Phase Incident Response Playbook Against Cyber Attacks
?
#17 The 8 Steps to Building a Phishing Awareness Security Program
?
#18 Why We’re Losing the War on Cybersecurity and How to Fix it
?
#19 How to Find Cybersecurity Products that Actually Work
?
#20 The 5 Laws of Cybersecurity and How to Follow Them
?
#21 Managed Detection and Response: How it Could be the Next Essential Step in Your Security Arsenal
?
#22 How to Create Security Training That Sticks
?
#23 How to Select a New Cybersecurity Tool or MSSP
?
#24 How to Prepare for Ransomware Attacks
?
#25 Apply Cybersecurity Fundamentals to the Modern World
?
#26 Why You Should Use the NIST Framework to Protect Your Business
?
#27 How to Build an Effective Intelligence Analysis Program
?
#28 How to Reinforce Your Cybersecurity Framework
?
#29 How to Use BAS to Find and Fix Cybersecurity Vulnerabilities
?
#30 Breaking Down The Gartner Market Guide for Email Security 2021
?
#31 CIO Insights on Balancing Revenue, Security and Service
?
#32 How to Keep Your Business Information Confidential & Safe
?
#33 Don't Underestimate the Human Element in Your Threat Intelligence Program
?
#34 Why Vulnerability Management is a Key Pillar in Your Cybersecurity Program
?
#35 What's Trending in Cybersecurity and How to Build a Successful Career
?
#36 *Bonus* Log4J: What You Need to Know and How To Respond
?
#37 Build A Legacy That Fulfils The Soul
?
#38 What We Can Learn From Nigerian Cybersecurity Culture
----------------------------?
We’re stronger together.
Keep connected with Cyber Security Heroes at Apple Podcasts, Spotify, Stitcher and Google Podcast.
Builder of cool forts | vCISO | Trusted cybersecurity advisor | Serving the cybersecurity community | GRC Expert
3 年You’re doing some great work Brendon. I love the new newsletter and am building my own now. Do you have a breakdown of the equipment you use for your podcast?
Senior Technology Leader Focused on Strategic IT, Systems Architecture, & Cyber Security, Developing Detailed Solutions for Clients while Optimizing Business Growth
3 年Thank you for sharing and helping Brendon it is greatly appreciated! Let the new year be healthy, happy and prosperous for all.
Empowering Alternative Asset Managers to strengthen cybersecurity, protect financial data, and leverage IT for a competitive edge | Trusted partner to safeguard your success | #1 Amazon Best Seller
3 年Happy New Year Brendon!
Chief Security Fanatic | CISO | Speaker | Columnist | Author | Radio Host | Board Member | Forbes Tech Council | TEDx | Canadian-American
3 年Thanks for having me on your podcast! I had a great time!!
Executive Chairman of the Board | Founder/Former CEO | NINJIO
3 年Thanks for all you do Brendon!