From the HG Cyber Playbook

Cyber Playbook: Ransomware and the OT Environment

Cyber Playbook: Ransomware and the OT Environment

Contributed By: Chris Thomas, Senior Security Consultant Ransomware and the OT Environment: Am I Safe? Ransomware is everywhere. It’s all over the news. It’s discussed within the cybersecurity industry at large. Unfortunately, this constant coverage is making us numb to the need to assess what our overall risks may be. This is especially worrying regarding our critical infrastructure. Do we... Read More
April 29, 2022
Cyber Playbook: An Overview of PCI Compliance in 2022

Cyber Playbook: An Overview of PCI Compliance in 2022

Contributed By: David Mundhenk, Principal Consultant, Consulting Services There's no denying it - Payment Card Industry (PCI) Compliance has risen in significance and will only continue to do so as we move forward. Being PCI compliant is essential to properly handle sensitive data including payment card data, cardholder data, and even sensitive authentication data. As we enter the second quarter... Read More
March 24, 2022
Cyber Playbook: How to Reverse an in-the-wild Log4J Java Class

Cyber Playbook: How to Reverse an in-the-wild Log4J Java Class

Contributed by Cody Craig, Cyber Investigator, CYDERES Threat actors have been observed dropping malicious Java Class files during Log4Shell exploitation. The sample reviewed in this post showed indication that it came from an attack that exploited the Log4Shell vulnerability via Apache in VMware Horizon. A deeper look into the capabilities and use of the malicious Java Class file observed is... Read More
February 28, 2022
Cyber Playbook: Information Technology vs Operational Technology – How to Leverage IT to Secure Your OT Systems

Cyber Playbook: Information Technology vs Operational Technology – How to Leverage IT to Secure Your OT Systems

Contributed by Chris Thomas, Senior Security Consultant, Advisory, Professional Services Information Technology (IT) primarily refers to hardware, software, and communications technologies like networking equipment and modems that are used to store, recover, transmit, manipulate, and protect data.  Operational Technology (OT), on the other hand, was born out of the need for Industrial Control Systems (ICS) to keep up with the... Read More
January 31, 2022
Cyber Playbook: How to Build a Strong Vulnerability Management Program

Cyber Playbook: How to Build a Strong Vulnerability Management Program

Contributed by Robert Herjavec, CEO & Founder A strong Vulnerability Management program is essential to a comprehensive and proactive cybersecurity program. It allows organizations to identify potential security gaps including access points that threat actors can leverage to gain entry into corporate networks and then prioritize these vulnerabilities for remediation. However, building a robust vulnerability management program can be complex... Read More
November 18, 2021
Cyber Playbook: 10 Reasons Why Identity and Access Management Programs Fail

Cyber Playbook: 10 Reasons Why Identity and Access Management Programs Fail

Contributed by Todd Musselman, Senior Vice President, Identity and Access Management This Cybersecurity Awareness Month, many IT security professionals, including myself and my team, are reflecting on the state of the cybersecurity industry. While identity management and IT security have been rising as a priority amongst government, enterprises, and individuals alike, the increase in sophistication and frequency of cybercrime shows... Read More
October 12, 2021
Cyber Playbook: Effective User-Centric Authentication is Critical for Modern Business

Cyber Playbook: Effective User-Centric Authentication is Critical for Modern Business

Over the past three decades, businesses around the world have been undergoing a rapid digital transformation. With more organizations moving both internal and front-facing operations to the cloud, Identity and Access Management (IAM) has become a paramount concern for many business executives. Historically Identity and Access Management programs were seen as a risk solution for an organization's internal team. However,... Read More
August 31, 2021
Cyber Playbook: Ransomware 101

Cyber Playbook: Ransomware 101

The team at Herjavec Group is made up of best-in-class, global talent and some of the most highly respected professionals in cybersecurity. With decades of experience and lessons learned, we want to share our insights with you. From the HG Playbook is a blog series where our diverse, specialized thought leaders will discuss all things cybersecurity. Every month one of... Read More
July 20, 2021
Cyber Playbook: 3 Steps to Integrating Phantom With Splunk Cloud

Cyber Playbook: 3 Steps to Integrating Phantom With Splunk Cloud

The team at Herjavec Group is made up of best-in-class, global talent and some of the most highly respected professionals in cybersecurity. With decades of experience and lessons learned, we want to share our insights with you. From the HG Playbook is a blog series where our diverse, specialized thought leaders will discuss all things cybersecurity. Every month one of... Read More
June 17, 2021