You're about to break my trust

If you're using yesterday's mindset, tools, and leadership techniques, you might be at risk of breaking the trust those have placed in you. It's not because you mean to. But that matters little to the person whose trust is broken. And it doesn't stop the cascade of negative effects you'll...

Continue reading

How to choose a Virtual CISO

During this webinar, ATOM's Security Practice Manager, Jason Sgro, gives an overview of how to select, hire, and utilize a vCISO.  We addressed the following: Why not having a qualified CISO is a major risk for more than just you and your company.Full time vs part-time CISO: Deciding who should enter the...

Continue reading

Conducting Your First Security Risk Analysis

In this instructional talk, Jason Sgro, discusses setting up and performing your first internal security risk analysis. We discussed defining your first threat landscape, setting up documentation and performing the risk analysis using specific examples. Specifically, we discussed: How to approach internal risk analysisJourney mapping is one of your most valuable...

Continue reading

How To Prepare For Ransomware & Complex Malware Infections

During this webinar, Jason Sgro, our security practice manager, focuses on the four “I’s” of identification, isolation, inoculation, and immunization used by ATOM’s incident response team. We discussed common defense strategies and expert tips about how to control active infections, developing your inoculation process and the importance of converting your...

Continue reading