Tools

Three Teams and a SIEM Webinar Movie

You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall...

SIEM 3: An Introduction

infotex Programming Coordinator, Michael Hartke, introduces a high level overview of the upcoming update to the infotex SIEM. Look for more movies in the coming months informing our Clients, and those just now learning about us, about the SIEM and its features and functions.

Reinventing Meeting Management Movie

A Webinar-Movie In our current world of uncertainty there is at least one thing that is certain. Business needs to continue, and that means that it is important for managers to be able to meet with their team even if everyone is working remotely at this point. In this Webi...

2020 IBA Cybersecurity Conference Insurance Review Checklist

Welcome 2020 IBA Cybercon Attendees! You can download a zip folder that includes our Simplified Insurance Review Boilerplate! Download Here Also, if you are interested in Insurance Review check out our video! [su_youtube url=”https://youtu.be/G2ElG1Jp6v8″ width=...

Succession Planning Governance

What the FFIEC has to say about succession planning for members of the IT Governance process… We have been hearing about examination findings requiring Clients to create a succession plan for key members of the IT Governance process.  Dan asked me to update our resea...

Cyber Challenge: A Community Bank Cyber Exercise

The FDIC has released new training material to help small banks start a discussion on risk… An article review. Sometimes it can be difficult to find a starting point when getting your employees discussing risk and technology, and while we do provide our own resource...

Object Access Limitations

Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are im...

The Difference Between Patch and Vulnerability Management

by Eric Kroeger and Jason Mikolanis We are pleased to kick off our “guest author program” and are very excited and honored to present Eric Kroeger and Jason Mikolanis as our first guest authors.  Thank you Eric and Jason!! A deeper dive . . . This is the techn...

Small Business Resource Page

Small Business Technology Risk Management Starting Points Remember, these are merely generic starting points! They may not be all-inclusive for your unique business! The infotex Small Business Technology Risk Assessment A starting point to determine tactics. For a movie on...

Consumer Breach Resources

As of April 2015 Websites to visit if you fear you’ve been breached! Federal Trade Commission From there are links to credit bureaus, reporting sites, and fraud alert sites. Internet Crime Compliant Center (IC3) Starting point for investigating scams, frauds, a...