Artificial Intelligence September 4, 2018 Checkmate: How to Win the Cybersecurity Game 4 min read - Some refer to information security as a war, but it's better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly.
CISO August 30, 2018 Why Your Organization Should Invest in Cybersecurity Insurance 3 min read - Despite the rising cost of a data breach, many organizations still believe they don't need cybersecurity insurance.
Incident Response August 29, 2018 Cybersecurity Muscle Memory: Drilling for a Tight Incident Response 3 min read - It's not enough to follow a rough outline of your incident response strategy. Conduct regular, intensive, detailed exercises within a well-defined framework to establish cybersecurity muscle memory.
Intelligence & Analytics August 28, 2018 3 Key Areas of Security Operations to Benchmark and Evaluate 3 min read - SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.
Incident Response August 24, 2018 Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker 5 min read - Security gamification engineer Richard Moore designs cyberthreat scenarios to unlock the competitive spirit of cybersecurity professionals and demonstrate how easy it is for anyone to hack a system.
Incident Response August 14, 2018 How John Clarke Shifted Gears From Driving Vans to Gamifying Incident Response 4 min read - Ten years ago, John Clarke was driving a van in Ireland for a living. Today, he develops games at IBM to help train security professionals on incident response and cyber situational awareness.
Incident Response August 14, 2018 How Mike Barcomb’s Military Mindset Enhances Incident Response 4 min read - IBMer Mike Barcomb draws upon his experience in the U.S. Army Reserve to lead a team of incident response experts through careful planning, regular rehearsals and quick decision-making.
Incident Response August 13, 2018 How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management 5 min read - The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.
Risk Management August 13, 2018 Lessons From the ISO/IEC 27005:2018 Security Risk Management Guidelines 3 min read - The International Standards Organization (ISO) recently released an updated version of its security risk-management guidelines, ISO/IEC 27005:2018. Here are the key lessons.
Threat Intelligence August 9, 2018 How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4 7 min read - Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.