incident response strategy

What We Learned From the 2017 National Insider Threat Symposium and Expo

The 2017 National Insider Threat Symposium and Expo, hosted by the National Insider Threat Special Interest Group (NITSIG), put the spotlight on insider threat detection, behavior patterns, program development, law enforcement, legal ramifications, and future challenges. The one-day event consisted of speakers from a mix of backgrounds, including insider threat risk mitigation experts, private sector business professionals, and… Read More

security assessment services

2017 Threat Monitoring, Detection, and Response Survey: Take the Survey and Get the Free Report

Delta Risk has partnered with the Information Security Community on LinkedIn to examine the latest management trends, investment priorities, key challenges, and solutions preferences for incident response, threat hunting, threat detection, threat monitoring, insider threats, incident recovery, and more. Everyone who completes this comprehensive survey will receive a copy of the complete 2017 Threat Monitoring, Detection, and Response Report as… Read More

grid cyber security risks

New White Paper Details Threats to Grid Cyber Security

The power grid continues to be a target for sophisticated cyber attacks. In the past day, the latest attack – the biggest to ever hit Ukraine, according to its government – disrupted the Ukrainian state power distributor. Fortunately, this disruption didn’t impact power supplies or Ukraine’s broader operations. But this is yet another in a series of attacks that… Read More

new york cyber security regulations

New York Cyber Security Regulations: Are You Ready to Implement 23 NYCRR 500?

March 1, 2017, marked the day that “23 NYCRR 500” (the New York Cyber Security Regulation) went into full effect for all New York Department of Financial Services (NYDFS) regulated individuals and organizations. These groups are required to adopt programs, policies, and procedures to protect their most sensitive information and assets from cyber security threats. With… Read More

vulnerability scans

Cyber Handyman Skill #5: Tools to Run Basic Vulnerability Scans

Throughout our blog series, 5 DIY Cyber Security Skills Every IT Professional Needs to Master, we have looked at skills and tools that are useful for cyber handy men and women. Much like being able to use a hammer, screwdriver, drill, or saw, having the ability to use virtualization, nmap, understand code, and the command line enables many other DIY tasks…. Read More

report insider threats

Afraid to Report Insider Threats? Here’s How to Avoid the Fear Factor

Imagine the following scenario: you work with a colleague who everyone sees as a problem. This individual complains about the direction of the company, unfair treatment, and even vocalizes personal financial struggles. People have come to expect this kind of negative behavior from him. One day, though, you overhear this disruptive co-worker say something out… Read More