ARE YOU READY TO BE COMPLIANT BY AUGUST 28, 2017?

[fa icon='calendar'] Aug 11, 2017 11:40:17 AM / by John Bliss posted in compliance, New York Cybersecurity Regulations, Cybersecurity requirements

[fa icon="comment"] 0 Comments

If you are one of the New York financial services companies and still busy preparing to be compliant with the first part of New York Cybersecurity Regulations by the deadline - August 28th, 2017. Here is what you should know.

Read More [fa icon="long-arrow-right"]

At Risk Technologies & MainStreet USA

[fa icon='calendar'] May 14, 2017 5:46:15 PM / by Darren Morris posted in MainStreet USA, MME, Mid Market Enterprise

[fa icon="comment"] 0 Comments


INTRODUCTION:

@RISK Technologies, a Strategic IBM OEM World Wide partner, is here to protect America's Mid Market corporations from cyber crime. The Cyber threat that is out there today is real, complex, and evolving. Corporations have been unable to protect themselves and slow to identify when they have been breached. 147 days is the average amount of time before a business realizes it has been breached and normally it finds out through a 3rd party disclosure. 

  • @RISK’s intent is to stand between the threat and its Customers while enabling an Intelligent Security posture.
  • Our technology was designed to pre-empt bad activities while averting costly and lengthy incident response checklists and Digital Forensic Investigations
  • Automates costly methods using machine learning, @RISK will save our Customers money. 
Read More [fa icon="long-arrow-right"]

About At Risk technologies

[fa icon='calendar'] May 14, 2017 4:57:23 PM / by Allen Mitchell posted in Cyber attack surface

[fa icon="comment"] 0 Comments


INTRODUCTION OF @RISK:

@RISK Technologies, Inc., an IBM World Wide Strategic Embedded Solutions Partner, includes team members with decades of experience:

  • Composed of former IBM & MIlitary leaders they have supported the Department of Defense (DOD), U.S. Intelligence Agencies, U.S. Special Operations, the United States Army, the United States Marine Corps and the DOD CIO.
  • Over 50% of the team maintains Top Secret Security Clearance
  • Over 150 years of team experience at IBM
Read More [fa icon="long-arrow-right"]

Cyber Insurance & "Left of Bang" Technology

[fa icon='calendar'] Apr 5, 2017 6:36:07 PM / by Allen Mitchell

[fa icon="comment"] 0 Comments

Cyber Insurance working with Cyber Defenders:

Cyber Situational Awareness is achieved by measuring the Cyber Attack Surface.

  • It’s better to detect sinister intentions early
  • Than to respond to compromised networks and conduct cyber forensics actions late

@RISK technologies employs and emphasizes the network-saving importance of cyber situational awareness.  Left of Bang, is a reference to the cyber attack timeline of a cyber incident.

  • “Bang” is when malware is deposited, the attack begins, or damage is done.
  • On a timeline moving from left to right, “right of bang”” is what happens after the incursion begins. In the worst-case scenario, you’re a casualty when you are to the right of bang.
  • Therefore, you need to stay to the Left of Bang! In that area you need to be alert, ready, prepared, and able to respond before the bad stuff happens.

Getting  Left of Bang and achieving situational awareness is possible by recognizing certain revealing characteristics that will enable one to detect potential attackers in time to avoid or upset their nefarious intent.

Read More [fa icon="long-arrow-right"]

Privacy by Design:  Thoughts from the CPO

[fa icon='calendar'] Apr 5, 2017 1:31:48 PM / by John Bliss posted in Privacy by design, cyber

[fa icon="comment"] 0 Comments


PRIVACY BY DESIGN:

Privacy by Design is an approach to systems engineering which takes privacy into account throughout the whole engineering process. The concept is an example of value sensitive design, i.e., to take human values into account in a well-defined manner throughout the whole process and may have been derived from this.

Given recent events in the Market, embedding a design based approach to privacy is prudent:

Read More [fa icon="long-arrow-right"]