Controls

Technology Planning 2020 Webinar

Welcome Webinar Attendees! You can download the deliverables by clicking on the link below. Boilerplates/Handouts Click here to download files.        

2020 Technology Planning Webinar

Thanks for being interested in our Technology Planning Webinars! This year‘s annual webinar on the subject will include a review of the previous years’ movies that are already available, and a discussion about alternative tactics that have arisen from recent virt...

Four Risk Appetite Statements

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . For all the same reasons a board of directors would want to establish a risk appetite statement on loan risk or other major risk categories, the 2015 Cybersecurity Asse...

Microsoft Considers Changing Password Guidance

Password expiration rules can create more problems than they solve… An article review. Passwords, it seems, are a lot like diets. They’re often necessary, but no one really wants to have to deal with them–and we’re always looking for the next tr...

The Evolution of Phishing

As user awareness grows, criminals are changing their tactics… An article review. First, some good news: Users are becoming more aware of phishing attacks, especially high-ranking users such as executives. Unfortunately, the bad news is that criminals are aware o...

Risk Versus Severity When In A Panic

Risk isn’t the only thing to consider when planning a decision tree. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . During tuning, we’re sometimes asked, as we help our MSSP Clients establish a detailed deci...

The Difference Between Patch and Vulnerability Management

by Eric Kroeger and Jason Mikolanis We are pleased to kick off our “guest author program” and are very excited and honored to present Eric Kroeger and Jason Mikolanis as our first guest authors.  Thank you Eric and Jason!! A deeper dive . . . This is the te...

Former NIST Official Regrets Issuing Password Guidance

Bill Burr admits security advice actually created more vulnerable passwords. An article review. If you’ve ever angrily questioned some seemingly arbitrary rule when creating a new password, there is some vindication for you: the former government official whose pa...

Nine Years Later, NIST Agrees With Dan!

For the sake of user comfort, new draft document calls for an end to mandatory password changes, and other requirements. An article review. Long-time readers may remember Dan’s Password Manifesto, originally published in the Hoosier Banker Magazine in 2008, where ...

Ransomware: Should You Pay or Should You Go?

Avoiding “The Clash” with Management! A Jolley | Hadaway article review. There are three things very unique about ransomware:  First, from a containment perspective, it’s a bit different than normal malware.  Second, from a response perspective, the w...