Should You Consider a Managed SIEM Service?

Should You Consider a Managed SIEM Service?

While a SIEM is a vital tool for monitoring networks, could a Managed SIEM service make an impact on your business?

managed siem service

What is a SIEM?

Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system.

The acronym SIEM is pronounced “sim” with a silent e.

The underlying principles of every SIEM system is to aggregate relevant data from multiple sources, identify deviations from the norm, and take appropriate action.

For example, when a potential issue is detected, a SIEM might log additional information, generate an alert, and instruct other security controls to stop an activity’s progress.

managed siem service Payment Card Industry Data Security Standard (PCI DSS) compliance originally drove SIEM adoption in large enterprises but concerns over advanced persistent threats (APTs) have led smaller organizations to look at the benefits of a SIEM and what a managed security service provider (MSSP) can offer.

Read more: Do you need a SIEM to be PCI Compliant?

Being able to look at all security-related data from a single point of view makes it easier for organizations of all sizes to spot patterns that are out of the ordinary.

Today, most SIEM systems work by deploying multiple collection agents in a hierarchical manner to gather security-related events from end-user devices, servers, network equipment, as well as specialized security equipment like firewalls, antivirus, or intrusion prevention systems.

The collectors forward events to a centralized management console where security analysts sift through the noise, connecting the dots and prioritizing security incidents.

What is Managed SIEM?

Managed SIEM is the process of outsourcing the monitoring of your SIEM to an outsourced security provider. Many organizations take advantage of a Managed SIEM service because they are able to leverage the expertise of security professionals on an around the clock basis. You are also able to reduce training costs, gather greater threat intelligence, and scale faster.

Read more Managed SIEM FAQs here. 

Questions About Managed SIEM Pricing

Cybriant’s Managed SIEM service pricing is based on a number of different variables. These variables include the level of support, software licensing cost, number of devices, and post-implementation services. To request a quote, fill out our form here. 

Is Managed Security Right For You?

A SIEM is a complex tool that requires expertise to implement and maintain. To be effective, a SIEM has to be constantly updated and customized because external threats and internal environments are constantly changing.
It requires experienced security engineering to tune the SIEM to minimize false positive alerts and maximize the efficient detection of real breaches or malicious behavior.

Managing a SIEM ain’t easy

Utilizing and managing a SIEM in-house is typically reserved for large organizations that have the budget for developing a large, specialized team. Deploying a fully managed SIEM also means that your team consists of security analysts that oversee your system around the clock and calendar. This is their one and only dedicated job, and not an additional task for an already overworked engineer.

If you need help with any of the following questions, then a managed SIEM may be right for your organization. Learn more about our Managed SIEM service. 

  • Does your company have a framework-based security program?
  • Are you required to keep up with compliance regulations or IT audits?
  • How are you meeting requirements or IT audits?
  • Do you have a SIEM? Inhouse or Outsourced?
  • Are you receiving the business value you expected from your SIEM?
  • Are you considering deploying a SIEM?
  • Are you constrained by time, resources, or budget?

Read more

Managed SIEM Use Cases

Regulatory.  All major regulatory acts require affected companies to implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.  This includes regulations such as PCI-DSS, HIPAA, GLBA, and others that impact industry verticals like Retail, Healthcare, Financial Services, Government, and Education.  A properly implemented SIEM captures, stores, and analyzes this information.

Supply Chain Framework and Compliance. Many clients have contractual requests based on their framework. Cybriant’s services are aligned with the NIST Cybersecurity Framework.

Cyber Risk Management.  Properly implemented SIEMs are essential to the discovery of the most sophisticated cyber attacks known as advanced persistent threats (APTs), and aid in ensuring other defense tactics and tools are operating effectively.

Why Managed SIEM?

Limited IT Staff.  Most midsize and lower enterprise organizations lack the in-house IT staff required to maintain the tools they have in place, much less implement and manage new security products. Nor do they have adequate personnel coverage for 24/7 monitoring, analysis, and response.

Lack of Security Expertise.  In addition to not having enough IT staff, midsize and lower enterprise companies lack the security expertise necessary to research, analyze, and understand threats, leaving them woefully under-prepared to effectively respond to a cyber attack.

Insufficient Budget.  Trying to build and maintain an in-house security team with the necessary skills and tools to be effective is not only difficult, but it’s also expensive and beyond the means of most mid-size and lower enterprise companies who are contending with limited IT budgets.

Dynamic Computing Environments.  The rising adoption of cloud services and mobile computing has led to a dynamic IT infrastructure with a porous perimeter and growing attack surface, which is far more difficult to defend, especially for under-resourced teams.

Benefits of Managed Services vs. In-House Services

It’s tempting to consider your in-house IT team to take care of your SIEM, but is it the right decision for your business?

If you’re like most businesses, you’re always on the lookout for ways to save money while improving results. Sometimes this means expanding your staff to include a team of tech specialists at your beck and call, but this can often be an unnecessary expense that leaves you with highly paid employees twiddling their thumbs all day.

For organizations who are looking for the best of both worlds, we recommend Managed Security Services.

Put simply, Managed SIEM gives you a team of specialist 24/7 security analysts and network experts – and at a fraction of the cost. Naturally, you’d rather see your IT budget working to support your growth and kept as low as possible.

That’s our focus too, and why we don’t simply maintain and repair your systems, we proactively monitor to avoid downtime and work with you to ensure your IT increases productivity and efficiency. Whether you already have in-house IT and are auditing the value, or are curious about what having IT support might be like for your business, we’ve put together a few factors to consider before making your choice:

Availability: Most employees work 9-5, but what happens if something goes wrong with your systems outside these hours? Our team is monitoring your SIEM on a 24/7 basis and will only alert your team if a major incident is detected.

Total cost: If you have considered building a Security Operations Centers (SOC) for your organization, take a few minutes to download the ebook, Insource vs. Outsource: Cost Comparison for building a 24/7 Security Operations Center.  We will take you through the exact costs of building an internal SOC for a medium-sized business and compare it to the costs of outsourcing to a cybersecurity firm like Cybriant.

Ongoing Training: Putting aside the fact your internal team will often spend entire weeks away upgrading their skills and leaving you scrambling for support while they’re gone, those training costs quickly add up. With a salaried SOC, you’ll have to pay all ongoing training and certification costs, plus travel costs for industry conferences. We know how important it is to remain current, certified, and skilled in new technologies, so we spend the money to invest in ourselves so we can serve you better. We’re part of industry-related communities and attend multiple conferences each year, all at our own expense.

Different goals: For most employees, a higher wage is the goal and many will job-hop to achieve that. Internal security analysts may be looking for the first opportunity to leave and get paid more, often leveraging all the training you’ve just provided. In these modern times, switching jobs regularly is expected, with an average of only 3 years in each position. Considering how much it cost your business to acquire, train, and upskill your technician, 3 years is an unreasonable ROI. Our goals couldn’t be more different – we only aim to keep you a happy customer for as long as we can!

In the end, your business needs to find the right balance between profit and expertise. When you partner with our Managed security services, you’re securing availability, ever-increasing expertise, and commitment to your success. We work closely with you to provide the very best support and protect you from costly disasters, taking preemptive action to keep you safe and operational. There’s no doubt our Managed SIEM service is a better decision than building an in-house SOC, and we’d be delighted to prove it to you.

Learn more about Managed SIEM here. 

5 Malicious Yet Common Types of Malware

5 Malicious Yet Common Types of Malware

It’s important to understand the most common types of malware, so the more prepared your organization will be to fight against those threats. Read more about the common threats and how you can fight against them.  

common types of malware

There are many ways to protect your business from ransomware threats, here are the basics of malware to help you understand the threats to your organization.

Malware vs. Ransomware

We recently discussed the top 15 types of ransomware threats that we’ve seen this year, but what is the difference between malware and ransomware?

Malware is the general term for any program that is designed to damage, disrupt, or hack a device. Viruses and ransomware are malware.

Ransomware is malicious programs that block access to your device until you pay a ransom fee to its creator. It is often very difficult and expensive to remove.

What is Malware?

The term “virus” is often used to describe many different types of infection a computer might have.  Virus, when used as a blanket term, can describe any number of potential computer programs. What these programs have in common are they are typically designed to cause damage, steal data, or spread across the network.

Malware describes software designed to act maliciously on a personal computer.  The name ‘malware’ is a shorthand for ‘malicious software’ and describes exactly what it is. A computer virus is a single type of malware that can cause harm to your PC, but it is only one of many.

Common Types of Malware Include:

#1. Adware

Short for advertising-supported software, adware is a type of malware that delivers advertisements to your computer.  These advertisements are often intrusive, irritating, and often designed to trick you into clicking something you don’t want. A common example of malware is pop-up ads that appear on many websites and mobile applications.

Adware often comes bundled with “free” versions of software that uses these intrusive advertising to make up costs.  Commonly it is installed without the user’s knowledge and made excessively difficult to remove.

#2. Spyware

Spyware is designed to spy on the user’s activity without their knowledge or consent.  Often installed in the background, spyware can collect keyboard input, harvest data from the computer, monitor web activity, and more.

Spyware typically requires installation to the computer. This is commonly done by tricking users into installing spyware themselves instead of the software or application that they thought they were getting. Victims of spyware are often completely unaware of its presence until the data stolen is acted on in the form of fraudulent bank transactions or stolen online accounts.

#3. Virus

In technical terms a computer virus is a form of malware that is installed inadvertently, causing damage to the user.  A typical virus may install a keylogger to capture passwords, logins, and bank information from the keyboard.  It might steal data, interrupt programs, and cause the computer to crash.

Modern virus programs commonly use your computers processing power and internet bandwidth to perform tasks remotely for hackers.  The first sign of this can be when the computer sounds like it is doing a lot of work when no programs should be running. A computer virus is often spread through installing unknown software or downloading attachments that contain more than they seem.

#4. Ransomware

A particularly malicious variety of malware, known as ransomware, prevents the user from accessing their own files until a ransom is paid.  Files within the system are often encrypted with a password that won’t be revealed to the user until the full ransom is paid.

Instead of accessing the computer as normal, the user is presented with a screen that details the contact and payment information required to access their data again.

Ransomware is typically downloaded through malicious file attachments, email, or a vulnerability in the computer system.

#5. Worm

Among the most common type of malware, today is the computer worm.  Worms spread across computer networks by exploiting vulnerabilities within the operating system.  Often these programs cause harm to their host networks by consuming large amounts of network bandwidth, overloading computers, and using up all the available resources.

One of the key differences between worms and a regular virus is its ability to make copies of itself and spread independently.  A virus must rely on human activity to run a program or open a malicious attachment; worms can simply spread over the network without human intervention.

How to Protect Your Organization from Common Types of Malware

You can plan today for cybersecurity threats – here are the top threats we are prepping for.

We typically recommend taking it back to the basics – People, Process, and Technology when creating your security strategy. Our team uses the NIST Cybersecurity Foundation for any and all technology decisions – and we recommend this foundation to our clients as well.

pretect We have found that most threats fall under 4 main categories – advanced persistent threats, compromised endpoints, poor patch management, and technical vulnerabilities. Our PREtect service covers all these threats in one simple service. PREtect includes 24/7 managed SIEM, Managed Detection and Remediation (MDR), and Comprehensive vulnerability management. These three services cover the first four levels of NIST CSF – including Identify, Protect, Detect, and Respond.

Learn more about PRetect here: https://cybriant.com/pretect/

Now is also the perfect time of the year to schedule your security risk assessments, mobile security risk assessments, penetration tests, etc. Learn more about our assessment services here.

Security Training for All (Plus MDR)

People are the core of your business success. At the same time, they can also represent a real security threat. According to Experian, only 45% of companies have mandatory cybersecurity training.

Yet your staff needs to understand the many ways in which they can put your business at risk. IT can’t be the only team making cybersecurity a priority.

In educating employees about common types of malware:

  • Impress the importance of caution and questioning the source of any communication with links or attachments. Hovering over URLs can show where the link leads. Grammatical and spelling errors are often a red flag, too.
  • Require the use of MDR and consider 24/7 monitoring
  • Explain why you have an acceptable-use policy. Talk about what could happen if they decide to download that one app from the Web to their work device.
  • Warn them about installing random USB drives hoping to connect the stray device to its owner. Dropping thumb drive devices is a common way cybercriminals gain illicit access.
  • Emphasize the importance of physical security, too. A stolen unencrypted laptop or someone accessing an on-site computer can lead to a breach.
  • Provide them with a way to report suspicious emails, communications, and potential compromise.

Even after you’ve taken the above advice to educate employees, there are still risks. Some of these emails are very convincing. People are busy, working fast, tired, and overly trusting. Additionally, these particular scams are targeting our preoccupation and fears around the coronavirus. It only takes one bad click to breach your system, which is why we highly recommend an MDR service. 

Learn More About MDR
FBI Warns of Aggressive Ransomware Targeting the Healthcare Industry

FBI Warns of Aggressive Ransomware Targeting the Healthcare Industry

The healthcare industry should be expecting a wave of aggressive ransomware in the coming days as many of the largest healthcare providers have already been hit, causing massive damage. Here are some tips Healthcare providers can use to prepare. 

ransomware healthcare

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) recently shared a Joint Cybersecurity Advisory to warn that they had “credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.”

Based on the advisory, the healthcare industry needs to ensure that they take timely and reasonable precautions to protect their networks from these threats.

Current Ransomware in Healthcare Threats

At least five hospitals were hit with the ransomware attacks this week, the federal agencies said. Ransomware attempts jumped 50% in the last three months, over the first half of 2020, and hospitals and health care organizations were the hardest hit, according to a study earlier this year by Check Point research.

A total of 59 U.S. health care providers or systems have been impacted by ransomware in 2020, disrupting patient care at up to 510 facilities, according to APNews. 

Typical attacks demand several hundred thousand dollars, and some have demanded $5 million or more, the research group concluded. Hospitals are often targeted because criminals know they are more likely to pay than other businesses. That’s because hospitals can’t shut down for long without impacting patient care.

In June, the University of California San Francisco disclosed that it paid $1.14 million to ransomware attackers. In Germany, a woman died when a hospital under a ransomware attack couldn’t admit her. Universal Health Services, one of the nation’s largest health providers, was struck last week. Source

The advisory listed more information about the strands of ransomware:

Trickbot

The cybercriminal enterprise behind TrickBot, which is likely also the creator of BazarLoader malware, has continued to develop new functionality and tools, increasing the ease, speed, and profitability of victimization. These threat actors increasingly use loaders—like TrickBot and BazarLoader (or BazarBackdoor)—as part of their malicious cyber campaigns. Cybercriminals disseminate TrickBot and BazarLoader via phishing campaigns that contain either links to malicious websites that host the malware or attachments with the malware. Loaders start the infection chain by distributing the payload; they deploy and execute the backdoor from the C2 server and install it on the victim’s machine.

What began as a banking trojan and descendant of Dyre malware, TrickBot now provides its operators with a full suite of tools to conduct a myriad of illegal cyber activities. These activities include credential harvesting, mail exfiltration, crypto mining, point-of-sale data exfiltration, and the deployment of ransomware, such as Ryuk and Conti.

BazarLoader/BazarBackdoor

Beginning in approximately early 2020, actors believed to be associated with Trickbot began using BazarLoader and BazarBackdoor to infect victim networks. The loader and backdoor work closely together to achieve infection and communicate with the same C2 infrastructure. Campaigns using Bazar represent a new technique for cybercriminals to infect and monetize networks and have increasingly led to the deployment of ransomware, including Ryuk. BazarLoader has become one of the most commonly used vectors for ransomware deployment.

In addition to TrickBot and BazarLoader, threat actors are using malware, such as KEGTAP, BEERBOT, SINGLEMALT, and others as they continue to change tactics, techniques, and procedures in their highly dynamic campaign.

Ryuk Ransomware

Typically Ryuk has been deployed as a payload from banking Trojans such as TrickBot.2 Ryuk first appeared in August 2018 as a derivative of Hermes 2.1 ransomware, which first emerged in late 2017 and was available for sale on the open market as of August 2018. Ryuk still retains some aspects of the Hermes code. For example, all of the files encrypted by Ryuk contain the HERMES tag but, in some infections, the files have .ryk added to the filename, while others do not. In other parts of the ransomware code, Ryuk has removed or replaced features of Hermes, such as the restriction against targeting specific Eurasia-based systems.

Find out more about the origins of Ryuk here. 

Why Do Criminals Target Hospitals with Ransomware?

The main reason for any ransomware is profit. Criminals make money either through organizations paying the ransom, selling the stolen data on the dark web, or using the credentials to pilfer money. The reason criminals target hospitals is because of the massive amounts of personal data taken in by hospitals.

Most victims of ransomware noted the loss of patient names, addresses, telephone numbers, email addresses, dates of birth, IP addresses, marital status, race, provider information, patient Social Security numbers, health insurance numbers, and mental or health condition or treatment information.

The aggressive offensive by a Russian-speaking criminal gang coincides with the U.S. presidential election, though there was no immediate indication it was motivated by anything but profit.

FBI Recommendations for the Healthcare Industry

In addition to the best practices listed by the FBI, Cybriant recommends putting your organization on the offensive.

With a Managed Detection and Response (MDR) service, healthcare organizations are able to protect their endpoints on a 24/7 basis. Endpoints are typically the weakest link in any organization. Our expert security analysts monitor and record all the events that occur on your endpoints. Our team focuses on relevant threats that attempt data exfiltration or modification.

When files attempt to execute these suspicious processes, an alert is triggered, and the attack is halted in real-time. When a credible threat is detected, our system will retrieve the process history and our team will analyze the chain of events in real-time and determine the validity of the threat.

Learn More About Cybriant MDR Free 30-Day Trial  

How Network Penetration Testing Plays a Vital Role in Security

How Network Penetration Testing Plays a Vital Role in Security

Network penetration testing can play a vital role in keeping your business well-protected against cyber threats. There are several reasons to consider a pentest, keep reading to find out why many organizations choose Cybriant for their penetration testing services.  network penetration testing

It’s important to consider an outside organization to routinely conduct network penetration tests, you’ll be able to ensure that your company is always safe from unknown vulnerabilities.

What is Network Penetration Testing? 

Penetration Tests, often referred to as ‘pen tests’ are necessary for organizations that have a compliance need, or that have a concern of a specified system, or are within the monitoring phase of an overarching security program. With Cybriant’s Pen Test, a professional hacker attempts to exploit a technical vulnerability to gain unauthorized access to specified systems. Penetration Tests are commonly misunderstood.

We will attempt to classify our various offerings:

Vulnerability Scan

When a company wants to understand any misconfiguration or known vulnerabilities that may exist in their infrastructure. It is highly recommended that a vulnerability scan be performed before any penetration test. If a penetration tester exposes a known vulnerability during a test that could have been remediated as a result of a vulnerability scan, the customer has wasted their money.

Standard Network Penetration Test

Identifies the actual exploitable vulnerabilities within the attack profile of a customer’s environment. Cybriant’s hackers will test for and verify the authenticity of a possible exploit. Each actual exploit will be cataloged, and a remediation recommendation will be presented. This is primarily for customers who are attempting to satisfy contractual, regulatory or industry requirements.

Advanced Network Penetration Test

When most people think ‘hacker’ they are thinking of Cybriant’s Advanced Network Pen Test. Cybriant’s professional hackers will attempt to gain access to a customer’s environment. Once access is gained the hacker will depending on customer preferences, reach further into the environment to expose the maximum amount of sensitive data as possible.

Cybercriminals are constantly developing new ways to access networks, but a network penetration testing service provider like Cybriant can help your business remain proactive against these evolving threats.

Here are the top seven reasons why you should consider a network penetration test for your business.

#1 Identify Areas of Vulnerability

One of the main reasons for network penetration testing is that it can help identify potential areas of vulnerability. A vulnerability assessment will evaluate your entire business network to look for any areas that may be susceptible to a data breach or a cyber attack. An IT service provider can also simulate various types of cyberattacks to immediately find any areas of concern that need to be fixed as soon as possible.

#2 Reduces Risk of a Cyber Attack

Taking the time to perform a network penetration test can play a vital role in limiting the chance of a successful cyber attack against your business. Always staying proactive is essential in looking for ways to improve and avoid becoming complacent. You will have the peace of mind to know that your company is always well-protected with an IT service provider that performs network penetration tests on a regular basis.

#3 Saves You Money in the Long-Term

Business owners are always looking at ways to save money while still keeping their company well-protected against cyber attacks. Performing a network vulnerability test is much cheaper in the long run compared to being the next victim of a data breach or a cyber attack. Making cybersecurity a top priority for your company will help your business stay one step ahead of cybercriminals while helping you avoid the high costs of these malicious attacks.

#4 Maintain Business Continuity

A business continuity plan is critical in helping your company bounce back from any situation while keeping downtime to a minimum. Scheduling a network penetration test is essential to ensure that your network can handle a wide range of threats. An IT service provider will always look at ways to improve your business continuity plan and is never satisfied with the status quo.

#5 Follow Industry Regulations

Many organizations must follow strict regulations for their particular industry. Failure to maintain compliance can lead to significant fines or even the closure of an entire company. Penetration testing can play a crucial role in helping your business maintain regulations for your industry by maximizing cybersecurity to prevent a costly data breach.

Most regulatory acts require affected companies to implement procedures to regularly test and affirm security control effectiveness. This includes regulations such as PCI-DSS, HIPAA, GLBA, and others which impact industry verticals like Retail, Healthcare, Financial Services, Government, and Education. A network test by Cybriant ensures third party impartiality and regulatory rigor.

#6. Supply Chain Framework and Compliance

Many clients have contractual requests based on their framework. Cybriant’s services are aligned with the NIST Cybersecurity Framework.

Beginning in the fall of 2020, Cybersecurity Maturity Model Certification or CMMC compliance will be a prerequisite for all new contracts including prime and subcontractor for the Department of Defense. Any contractor storing or transmitting controlled unclassified information (CUI) will need to achieve Level 3 compliance.

The Department of Defense has defined 5 levels of CMMC compliance, each with a set of supporting practices and processes. To meet a specific level, each contractor must meet the practices and processes within that level and below. Learn more about CMMC here. 

#7. Cyber Risk Management

A penetration test is the final step in monitoring and assessing the effectiveness of a security program. All frameworks require the testing of security controls and the most common method is a penetration test.

Why Should You Perform a Penetration Test on Your Network?

Consider the following reasons that many of Cybriant’s clients have used our network penetration testing services. If your clients or 3rd party vendors are asking for an external penetration test, these are the reasons it may make sense for your organization:

  • Meet regulatory and other compliance mandates
  • Value add differentiator to represent a responsible stance while marketing
  • Major changes occurred in the environment
  • Satisfy contractual requirement
  • Ease customer’s minds
  • Critical control in all frameworks, regulatory and other
  • Understand the threat to the Environment
  • Ensure major changes have not exposed new vulnerabilities
  • Identifying higher-risk vulnerabilities that result from a combination of lower-risk vulnerabilities exploited in a sequence
  • Identifying vulnerabilities that may be difficult or impossible to detect with automated network or application vulnerability scanning software
  • Assessing the magnitude of potential business and operational impacts of successful attacks
  • Testing the ability of network defenders to successfully detect and respond to the attacks
  • Providing evidence to support increased investments in security personnel and technology to C-level management, investors, and customers
  • Meeting compliance (for example: The Payment Card Industry Data Security Standard (PCI DSS) requires both annual and ongoing penetration testing
  • Post security incident, an organization needs to determine the vectors that were used to gain access to a compromised system (or entire network). Combined with forensic analysis, a penetration test is often used to re-create the attack chain, or else to validate that new security controls put in place will thwart a similar attack in the future.
  • Determining the feasibility of a set of the attack vector

In Conclusion

Network penetration testing is critical in maximizing uptime for your business while also protecting the reputation of your company. These vulnerability assessments can identify potential areas of weakness within your organization while also greatly reducing the risks of a cyber attack. Over time, these vulnerability assessments can play a key role in keeping your business well-protected and save you plenty of money in the long-term.

Learn about all risk assessments available through Cybriant here:

Network Penetration Testing

network penetration testing

Jeff Uhlich, CEO of Cybriant, Featured Speaker for Executive Security Briefing

Jeff Uhlich, CEO of Cybriant, Featured Speaker for Executive Security Briefing

Jeff Uhlich, CEO of Cybriant, has been selected by INSI, an Atlanta-based IT support provider, as the featured speaker for their upcoming Executive Security Briefing, SMB Cybersecurity Hindsight 2020.

Cybersecurity has never been more important than in the year 2020. However, there is no better way to prepare for the future than to revisit history. Hence, SMB Cybersecurity Hindsight 2020 will reveal:

  • 2020’s Biggest Cybersecurity Threats – How you can contain, respond and prevent them from this point forward.
  • Georgia Security Breach Notification (SBN) Laws – How SBN affects all your business relationships when protected information is shared among partners and vendors.
  • Types of Regulations – Find out how and if they affect you.
  • Assess Your Situation – How to assess your cybersecurity situation.

The Executive Security Briefing is ideal for executives of small- and medium-sized businesses (SMBs). This discussion will be straight forward and void of high tech talk. Rather, we address current cybersecurity risks and their solutions.

Jeff Uhlich leads Cybriant, an award-winning cybersecurity service provider, with over 25 years of experience in the areas of IT Security, Infrastructure, and Managed Services.  As CEO he is responsible for navigating the company in the fulfillment of its mission to deliver enterprise-grade cybersecurity services to Mid-Market companies in the finance, healthcare, legal, and retail verticals.

Mr. Uhlich received his certification as a Chief Information Security Officer (CISO) from Carnegie Mellon University.  He is also a graduate of the CIO Executive Development Program at San Francisco State University, College of Business, and the holder of a BA in Economics and Psychology from DePauw University.

About Cybriant

Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, operation, and monitoring of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services. These services include Risk Assessments, vCISO, 24/7 Managed SIEM with LIVE Monitoring and Analysis, 24/7 MDR, 24/7 Real-Time Vulnerability Scanning with Patch Management. We make enterprise-grade cybersecurity strategy and tactics accessible to businesses of all sizes. Find out more at https://www.cybriant.com. See our reviews here: https://www.g2.com/products/cybriant/reviews.

About INSI

INSI is an Atlanta-based IT support provider.  We offer both complete IT support packages for clients with no internal IT and a la carte customized packages for small IT departments.  Most importantly, we only charge the client for the exact service and level they actually need.  Interestingly, this unique support model has not only proven to save the client money, but it has also greatly complemented the client’s internal IT strengths.  Call our sales department at 770-387-2424, Option 2 for more information.

 

Get The Latest Cyber News In Your Inbox

Cyber news and threat updates from our cybersecurity experts.

You have Successfully Subscribed!

Read more cybriant reviews

You have Successfully Subscribed!