fbpx
Jason Hill selected to speak at BSides Atlanta

Jason Hill selected to speak at BSides Atlanta

bsides atlanta Register today for BSides Atlanta as Jason Hill, Director of Strategic Services for Cybriant, has been selected as a speaker.

BSides Atlanta Event Details

May 4, 2019
KSU Center, Kennesaw, GA
Event Website

The session title is “How to create a Compliance Baseline and Simplify Compliance Forever”

It seems there is a never-ending stream of acronyms that businesses now must learn and understand in order to be “compliant.” In fact, you may feel like a cat herder that is chasing one audit after another. Each new entrant into the pantheon of compliance complicates and weaves and even more complex web of checklists, procedures, policies, etc.  Each time new letters are added to our alphabet soup of regulations we must scramble to meet those specific lists of requirements.

What if there were a better way? In this presentation, we’ll take a step back and consider that all frameworks and requirements are very similar. In fact, about 80% of PCI and HIPAA controls overlap. Let’s look at the different framework audit requirements and see how we can take a common-sense approach to your next audit.

At the end of the day, regulations have many of the same themes.  Check audit logs, protect desktops, train users, etc.  The first step is to start with a baseline, a starting point upon which all other compliances can be compared. After the baseline has been established, you’ll be able to quite the noise and provide a clear path towards meeting existing and yet to come compliance matrices.

Date: May 4, 2019
Event Time: 9am-5pm
Event Location: KSU Center at 3333 Busbee Dr NW, Kennesaw, GA 30144

https://bsidesatl.org/

About Jason Hill

jason hill As Director of Strategic Services, Jason serves on Cybriant’s management team. With over 20 years of experience in the areas of IT Security, Infrastructure and Managed Services, Mr. Hill is an accomplished security consultant and security trainer.

He has personally completed dozens of assessments and audits utilizing the NIST-RMF, NIST- CSF, and ISO 27001 frameworks including his work as a PCI QSA.

As an accomplished InfoSec speaker, he is also a leading certified instructor for AlienVault having delivered over 50 classes to end-users and MSSPs around the globe and across all industry verticals. Having a background in system architecture as well as security and compliance he brings a unique perspective to each engagement.

Background

Having a background in system architecture as well as security and compliance he brings a unique perspective to each engagement.

Mr. Hill has held strong leadership positions within various industries including manufacturing, education, and service providers.

Education

Mr. Hill has earned a Master’s Degree in Information Systems from Kennesaw State University and a Bachelor’s Degree in CIS, Information Systems from Shorter University.

He has a secret security clearance from the federal government and his personal certifications include, CISA and CISSP.

 

4 Necessary Elements of a Compliance Management Framework

 

Compliance Management System

Cybriant Executives to Speak at CheddarCon

Cybriant Executives to Speak at CheddarCon

cheddarconAlpharetta, GA – Cybriant, a leader in managed cybersecurity services, announced today that Andrew Hamilton and Jason Hill will speak at CheddarCon in Milwaukee, WI.

Andrew Hamilton, Cybriant CTO, will speak on cross-organizational cyber security alignment. Each person in your organization is a vital part of your security program, but does everyone understand their importance? How can you align the security goals of the organization with the functional responsibilities of each employee? Andrew will share how to enable various groups to work together harmoniously with the security team for optimal results.

Jason Hill, Director of Strategic Services, will discuss how to effectively wrangle the never-ending stream of acronyms that businesses now must learn and understand to maintain compliance.   By taking a step back and creating a compliance baseline, Jason will share how to quiet the noise and provide a clear path towards meeting existing and emerging compliance matrices.

CheddarCon is a fun and inspiring multiple-day Cyber Security conference where subject matter experts, specialists, executives, and industry thought leaders from Wisconsin and the midwest come to network, learn and discuss all aspects of security.

Find out more at https://cheddarcon.com/

About Cybriant

Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services. These services include Risk Assessments and vCISO, 24/7 Managed SIEM with LIVE Monitoring, Analysis and Response, 24/7 Managed EDR, 24/7 Real-Time Vulnerability Scanning, and Patch Management. We make enterprise-grade cyber security strategy and tactics accessible to the Mid-Market and beyond. Find out more at http://www.cybriant.com or call 844-411-0404.

Jason Hill Selected to Speak at Chicago IIA/ISACA 5th Annual Hacking & Cybersecurity Conference

Jason Hill Selected to Speak at Chicago IIA/ISACA 5th Annual Hacking & Cybersecurity Conference

Jason Hill, Cybriant’s Director of Strategic Services, is slated to speak at the Chicago IIA/ISACA 5th Annual Hacking & Cybersecurity Conference on September 10-11, 2018 in Chicago, IL.

The conference is a two-day event containing the most real-world application of Information Security and Cybersecurity knowledge and skills that can be applied to the world of Internal Audit, IT Audit, InfoSec, Risk, and Compliance. This year’s theme addresses emerging threats by discussing solutions and how the union of Audit, InfoSec, and Risk/Compliance departments creates a strong force, allowing the united enterprise to strike back against cyber threats. Following the success of last year’s event, the dual-track format featuring concurrent technical and non-technical tracks is offered again for the 2018 conference.

Mr. Hill will present a management and audit session.

His presentation, “The Compliance Saga Continues…How to Go from Jar Jar Binks to Han Solo” will discuss how it seems there is a never-ending stream of acronyms that businesses now must learn and understand in order to be “compliant.” By taking a step back and creating a compliance baseline, you’ll be able to quiet the noise and provide a clear path towards meeting existing and yet to come compliance matrices.

For more information on the Chicago IIA/ISACA 5th Annual Hacking & Cybersecurity Conference please go to https://www.eiseverywhere.com/ereg/index.php?eventid=350132&eb=565886

About Jason Hill 

With over 16 years of experience in the areas of IT Security, Infrastructure and Managed Services, Mr. Hill is an accomplished security consultant and security trainer. He has personally completed over 30 risk assessments utilizing the NIST-CSF and ISO 27001 frameworks. As an accomplished InfoSec speaker, He is also a leading certified instructor for AlienVault having delivered over 50 classes to end-users and MSSPS around the globe and across all industry verticals. And as a certified AlienVault engineer, he has also personally performed over 100 professional service engagements assisting companies in the implementation of AlienVault technology.

About Cybriant 

Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services. These services include Risk Assessments and vCISO, 24/7 Managed SIEM with LIVE Monitoring and Analysis, 24/7 Managed EDR, 24/7 Real-Time Vulnerability Scanning, and Patch Management. We make enterprise-grade cyber security strategy and tactics accessible to the Mid-Market and beyond. Find out more at http://www.cybriant.com

Cybriant in the News: Do I Need a Penetration Test?

Cybriant in the News: Do I Need a Penetration Test?

Jason Hill, Director of Strategic Services, was featured on the AlienVault blog.

Do I Need a Penetration Test? 

When most people think of a security breach they think of some pimply-faced teenaged genius sitting in a dark basement furiously hacking away at their infrastructure trying to gain access. Often, they will turn to a security vendor to test for this very scenario, this test is known as a penetration test.

I cannot tell you how many professionals consider this as the de facto (and sometimes only) test of their security. Unfortunately, when taken alone they’re testing the wrong thing. In the recent Cyber Security Intelligence Index, IBM found that 60% of breaches occur from insider threats. That means that 60% of the time your data isn’t stolen by someone breaking into your network, you gave them the keys.

Don’t get me wrong, a penetration test absolutely has its place in a holistic security program but a security program it is not. The insider threats statistic mentioned earlier doesn’t necessarily mean your organization is full of individuals waiting for the right time to sell your intellectual property to your biggest competitor; it means that the breaches that occurred were a result of insider action.

Full Article: https://cybersecurity.att.com/blogs/security-essentials/do-i-need-a-penetration-test

 

Top Cyber Security Testing Tools