Critical Insight
Critical Insight
  • Видео 292
  • Просмотров 63 850
Urgent Panel Webinar: How to Handle the Kaspersky Ban
If you’re using Kaspersky - now is the time to vet new solutions and switch providers.
The U.S. Department of Commerce’s Bureau of Industry and Security (BIS) has issued a Final Determination banning the sale of Kaspersky products and services in the country starting July 20, 2024, due to national security concerns. Furthermore, Kaspersky will be prohibited from providing software updates and malware signatures after September 29, 2024. The time to act is now.
Urgent Panel:
This session delved into the reasons for this “first of a kind” ban, as well as the ramifications of this action and provide actionable strategies for organizations to pivot effectively and safeguard your infrastructure w...
Просмотров: 73

Видео

Credential Abuse: Why, How, and What You Can Do About It
Просмотров 2721 час назад
Credential Abuse: Why, How, and What You Can Do About It
What ChatGPT Won't Tell You About Virtual Chief Information Security Officers (vCISO)
Просмотров 5028 дней назад
Curious about what a virtual Chief Information Security Officer (vCISO) really does? While basic answers are easy to find, they often lack depth and accuracy, leaving you with a skewed understanding of this vital role. This insightful webinar is designed for those who want to cut through the noise and get straight to the heart of how hiring an external cybersecurity expert can transform your op...
Urgent Panel Discussion: Healthcare Ransomware - Are You Negligent or a Victim?
Просмотров 96Месяц назад
Ascension Healthcare and Change Healthcare's recent ransomware attacks highlight the severe consequences healthcare organizations face, including massive financial losses and compromised patient safety. Join our urgent panel as we analyze these attacks, dissect potential liabilities, and provide actionable insights to bolster your defenses against the rising cyberthreats in healthcare. Key Take...
The New CIRCIA Reporting Requirements for Critical Infrastructure
Просмотров 912 месяца назад
The New CIRCIA Reporting Requirements for Critical Infrastructure
Cyber Insurance Changes: A 2024 update on getting the right cyber insurance
Просмотров 1153 месяца назад
Cyber Insurance Changes: A 2024 update on getting the right cyber insurance
Urgent Panel: Change Healthcare Cyberattack Implications
Просмотров 5813 месяца назад
Urgent Panel: Change Healthcare Cyberattack Implications
Implications of the HHS Cybersecurity Performance Goals (CPGs): Did the government go far enough?
Просмотров 824 месяца назад
Implications of the HHS Cybersecurity Performance Goals (CPGs): Did the government go far enough?
How to Measure and Reduce Your Cybersecurity Risk
Просмотров 1114 месяца назад
How to Measure and Reduce Your Cybersecurity Risk
Urgent Panel: Ransomware Criminals Targeting Patients and Parents in Upward Trend
Просмотров 1105 месяцев назад
Urgent Panel: Ransomware Criminals Targeting Patients and Parents in Upward Trend
Critical Insight New MDR Capabilities and New Risk Platform
Просмотров 1366 месяцев назад
Critical Insight New MDR Capabilities and New Risk Platform
Mike Hamilton's 2024 Cybersecurity Predictions
Просмотров 886 месяцев назад
Mike Hamilton's 2024 Cybersecurity Predictions
Critical Insight MXDR SOC Portal Demo
Просмотров 416 месяцев назад
Critical Insight MXDR SOC Portal Demo
How to (and How NOT to) Human-Proof Your Cybersecurity Strategy
Просмотров 877 месяцев назад
How to (and How NOT to) Human-Proof Your Cybersecurity Strategy
Urgent Panel Discussion: Legal Trouble and Claims of Negligence
Просмотров 587 месяцев назад
Urgent Panel Discussion: Legal Trouble and Claims of Negligence
Critical Insight GRC Platform Demo
Просмотров 478 месяцев назад
Critical Insight GRC Platform Demo
How to Build a Communication Plan for a Ransomware Attack
Просмотров 1308 месяцев назад
How to Build a Communication Plan for a Ransomware Attack
Building Your Security Program with Federal Grant Funding - Washington State - ACCIS Fall Conference
Просмотров 328 месяцев назад
Building Your Security Program with Federal Grant Funding - Washington State - ACCIS Fall Conference
AI in InfoSec: What's Hype and What's Real
Просмотров 1329 месяцев назад
AI in InfoSec: What's Hype and What's Real
Urgent Panel Discussion: MGM and Caesars Cyberattack
Просмотров 3249 месяцев назад
Urgent Panel Discussion: MGM and Caesars Cyberattack
The SEC 4-Day Cyber Disclosure Rule: What It Means For You
Просмотров 4610 месяцев назад
The SEC 4-Day Cyber Disclosure Rule: What It Means For You
What Drives Threat Actors
Просмотров 6310 месяцев назад
What Drives Threat Actors
Healthcare Data Breach Trends In The First Half Of 2023
Просмотров 15810 месяцев назад
Healthcare Data Breach Trends In The First Half Of 2023
5 Common, Avoidable Mistakes Companies Make in Security Programs
Просмотров 10310 месяцев назад
5 Common, Avoidable Mistakes Companies Make in Security Programs
Not All "Penetration Tests" Are Actual Penetration Tests
Просмотров 9911 месяцев назад
Not All "Penetration Tests" Are Actual Penetration Tests
5 Common, Avoidable Mistakes Healthcare Organizations Make In Security Programs
Просмотров 2411 месяцев назад
5 Common, Avoidable Mistakes Healthcare Organizations Make In Security Programs
Cybersecurity Awareness Training For Healthcare Professionals
Просмотров 38911 месяцев назад
Cybersecurity Awareness Training For Healthcare Professionals
Cybersecurity Changes For Public Water Systems
Просмотров 54Год назад
Cybersecurity Changes For Public Water Systems
WA Cyber Grant Deadline July 18
Просмотров 101Год назад
WA Cyber Grant Deadline July 18
Safeguarding Manufacturing: A Panel Discussion
Просмотров 66Год назад
Safeguarding Manufacturing: A Panel Discussion

Комментарии

  • @leslieya9787
    @leslieya9787 28 дней назад

    Would it be best to consult (provide implementation services) first before becoming as assessor?

  • @mahmoudshoaala
    @mahmoudshoaala 2 месяца назад

    Where is the slide, please?

  • @Susieq26754
    @Susieq26754 3 месяца назад

    United Healthcare has 490 billion invested. Why? Who is really involved? Poor and middle class people aren't getting it. That's for sure.

  • @desertjeeper
    @desertjeeper 6 месяцев назад

    Love the festive kraken Jake!

  • @JudeGaspardRX
    @JudeGaspardRX 6 месяцев назад

    Hi, awesome content. Thank you. What platform did you use for the video?

  • @hackmasterHQ
    @hackmasterHQ 7 месяцев назад

    Thank you! This was very helpful. I have an interview for a job that provides SOCaaS.

  • @Kai_1344
    @Kai_1344 9 месяцев назад

    Surprised that this channel isn't more popular. Thank you for yet another good video.

  • @hifiandrew
    @hifiandrew 9 месяцев назад

    Targarian AI FTW

  • @arvindbega4762
    @arvindbega4762 10 месяцев назад

    Promo SM 😌

  • @danielbaker4595
    @danielbaker4595 10 месяцев назад

    possible to get the link to the excel sheet Michael shared?

    • @CriticalInsight
      @CriticalInsight 10 месяцев назад

      hey there - shoot us an email if you haven't already and we'll do it! info@criticalinsight.com

  • @user-gi3jd8pt8f
    @user-gi3jd8pt8f Год назад

    Big thanks! Once again, the CI team pulls together to help us all stay informed with sage advice and knowledge. As stated, this is not the end of this threat. Be vigilant.

  • @PS-pr5ch
    @PS-pr5ch Год назад

    Great discussion! Listened live

  • @paulsonmichael3293
    @paulsonmichael3293 Год назад

    Hi, I want to get trained for and sit the CMMC certification exams. Please, how do I go about it?

  • @PS-pr5ch
    @PS-pr5ch Год назад

    Great webcast!

  • @roncollins1046
    @roncollins1046 Год назад

    I figure how you two pay for your leafy lifestyles must have something to do with government grants, which of course do not require any actual services rendered or results delivered, only documentary fiction meant to make it appear as though you were ever qualified or equipped to produce anything other than a completed grant application. Nice un-work if you can get it; or it must be, since plenty of hot-air peddlers of your variety are riding that particular gravy train. (And I know you got my other messages, and have a pretty solid hypothesis on why you refuse to act on them.)

  • @user-wx8jn8kh8v
    @user-wx8jn8kh8v Год назад

    interesting topics, ty guys

  • @debrawatts2172
    @debrawatts2172 Год назад

    Will there be a cap on the # of CCA & CCPs?

    • @debrawatts2172
      @debrawatts2172 Год назад

      BTW DFARS is Defense Federal Acquisiton REGULATION Supplement.

  • @jaymartin2625
    @jaymartin2625 Год назад

    Thanks guys

  • @arayter
    @arayter Год назад

    Mike was on fire as usual!

  • @cliffkahn
    @cliffkahn Год назад

    To be fair, Mike had a pretty good kicker last week. The one about the privacy institute

  • @humayoonpopal846
    @humayoonpopal846 Год назад

    Hello there world, I started the course online today and we will be digging into it as of Thursday. I can use any help if you don’t mind sharing

  • @mithoofarizi5538
    @mithoofarizi5538 Год назад

    very important content.

  • @thispleasesbulba
    @thispleasesbulba Год назад

    Excellent talk

  • @ianrobinson9802
    @ianrobinson9802 Год назад

    Star Trek Lower Decks for me 😊

  • @roncollins1046
    @roncollins1046 2 года назад

    Once the entire human experience had been turned over giddily and thoughtlessly to a vast mechanism of printed circuits without which ordinary human life is now regarded as inconceivable, this made it inevitable that continual threats to America's IT systems from multiple actors would by 2022, with a war on and all, be an easy selling point for continual and expanding federal intervention in order to protect them. And, by all appearances thus far, the rights of the people be damned.

  • @roberthamilton9053
    @roberthamilton9053 2 года назад

    Mike going to country music? What the heck! The rest of critical insight was good stuff.

  • @roncollins1046
    @roncollins1046 2 года назад

    As a survivor of the 20th century and the complete abandonment of an entire analog way of life which was overrun within a single generation by all this IT gimmickry, it appears to me that the potential for an analog component to the question of cybersecurity tends to be ignored. The overall purpose of any security for any enterprise is to protect that enterprise as a whole, whereas it looks like the cybersecurity philosophy limits itself to questions of whether the IT is secure or vulnerable or under attack, but does this obscure the potential for leaks and vulnerabilities themselves having nothing at all to do with the integrity of an IT system? As an example, here in Oklahoma, both State and local officials conduct official business on private cell phones so routinely that the bureaucracies' only answer to this behavior is 'it's fine, we do it all the time.' And in what amounts to a party-state run by the OKGOP establishment without appreciable opposition at any level, all the negligence and complacency and personal opportunism you might expect out of any party-state are plainly in evidence here. The official world here seems to take on faith (!) its own infallibility and invincibility, and upholds this posture as an official persona, there is a 'perfectly reasonable explanation' for everything, and the State is never, ever in the wrong, according to the State. Meanwhile, its IT systems leak like sieves, but the holes are not in the systems themselves, but rather the lax and self-assured attitudes of official employees who barely even have any concept of any kind of threat if it is not a direct threat on their own lifestyles and suppositions. If a potential issue raised by the citizenry does not appear to be a threat to the monopoly on power or the careers of particular officials, then that issue is simply ignored. Oklahomans are very, very skilled at changing the subject or just ignoring someone when what they say is not what someone wants to hear; it runs in the very fabric of how life is lived here. Folks apparently believe this is good manners. Oklahoma's vulnerabilities to 21st century threats are exacerbated by its apparent indifference to the prospect of actually joining the 21st century, beyond an infantile attraction to every new gimmick that comes on the market. But the only way this vulnerability is ever going to be proven to these dunderheads is when someone or some thing actually renders catastrophic damage to its government's systems. At which point the feds will take over, call it 'national security', and the Tenth Amendment is a thing of the past along with the rest of the rapidly-vanishing Bill of Rights. Maybe Oklahoma's government should just turn some of these toys off for good, while they still can.

  • @WAGISDev
    @WAGISDev 2 года назад

    Bjorn! Way to go calling out having to being able to understand the IT and Industrial system itself. I passed this video over to my former employer.

  • @roncollins1046
    @roncollins1046 2 года назад

    Yet another example of the federal establishment's continual long-term quest to eliminate 10th Amendment local self-governance outright, by funding and task-forcing State authorities into 'compliance' with ever-expanding federal requirements which essentially reduce State sovereignty to a kind of obedient provincialism. Current circumstances in eastern Europe (etc) continue to provide ready rationales for a federal posture of permanent emergency, which serves as an adaptable template for the engineering of endless federal incursions into State and local law enforcement, jurisprudence and regulatory application: the old catchall of 'national security' being stretched ever further to eventually include every detail of every American life's being regarded as potential evidence, merely awaiting appropriate casework to plug it into. Programmatic justice on a nationwide scale, flying first in the face of, and eventually out of the reach of, any residual notion of constitutional civil liberties, has long been the primary objective of the bloated and permanently entrenched federal establishment. None of this epic crusade toward eventual total DC hegemony over every aspect of American life has ever had anything to do with partisan politics or factional alignments. The DC regime is a faction unto itself, geared primarily toward the eventual aim of being a law unto itself, and being the only law there is. States do business with the DC machine at their extreme peril: any asset, program, budget or work force a State might regard as its own affair to govern can be and in time will be over-run by this strategy of fund-then-hijack which the DC executive branch has used, for generations, to reduce State governing powers to federal policy implementations required of DC's subordinate provinces, irrespective of the electoral or legislative preferences exhibited within any State. 'Cybersecurity' is just the latest in a long series of jingles deployed, in order to soften the countenance of what amount to, again and again and again, federal-executive Enabling Acts designed to erode civil liberties still further, in order to remove them as obstacles to continued expansion of programmatic DC powers. In the case of the matter at hand, the State of Oklahoma's prosecution service, its District Attorneys Council, may labor under an illusion for the time being of having its own way with all these networked surveillance systems it now aims at random citizens for its own murky ends; but in coming weeks and months may discover that the USDOJ and other federal entities may have uses of their own for all this DAC/UVED spy equipment, and perhaps even more so for all the data already generated and stored over the more than three years' time the program has been up and running. In short, when I applied for a driver's license in Oklahoma, I never signed some agreement that any information the State might manage to gather about my personal movements, by any means it has in its capabilities, might one day become part of some vast collection of personal, federal, dossiers kept on the citizenry in general. So I stopped driving automobiles altogether. The State has made the activity untenable for me with its experimental surveillance project, and may well end up being compelled for grant funding's sake to turn over every bit of intelligence it has gathered on me to some federal 'task force.' If this program is not shut down immediately, it is only a matter of time before it becomes just another outpost of federal surveillance powers, to be used for any purpose at any time in the future. How any of this careless playtoy foolishness, of pointing cameras at passersby and then seeking to extort them, was ever meant to serve or protect Oklahoma, escapes me. But what all this data thus generated, for no good or legally defensible reason in the least, might come to be used for in the future, and by whom, is a matter of conscience and civic duty right now, to all those who have enabled this UVED program, and all those who continue to allow it to operate.

  • @hifiandrew
    @hifiandrew 2 года назад

    Always enjoy the weekly updates. One suggestion, could you please get rid of the old CI Security youtube channel? I always end up on that wrong channel when looking for this one. :)

    • @CriticalInsight
      @CriticalInsight 2 года назад

      Thanks Drew - we love the feedback and its always great to hear from you. We found that old channel earlier and its shut down now, thanks for the reminder! ^Dave

  • @SaadMehboob84
    @SaadMehboob84 2 года назад

    Hi, during the webinar . You mentioned the DOD CIO has mentioned that every one holding CUI at level 2 will undergo third party assessment. This is different from what I previously understand where only some vendors holding critical CUI at level 2 will undergo C3PAO assessment. Could you provide me link to where DOD CIO have mentioned this. Thanks

    • @CriticalInsight
      @CriticalInsight 2 года назад

      Thank you for asking - certainly - you can find it here: federalnewsnetwork.com/cybersecurity/2022/02/more-companies-may-have-to-get-a-cmmc-assessment-after-all/

  • @bok2bok333
    @bok2bok333 2 года назад

    Very interesting thanks.

    • @CriticalInsight
      @CriticalInsight 2 года назад

      Thanks! We always appreciate feedback (especially positive feedback!).

  • @zenriding1249
    @zenriding1249 2 года назад

    Isn't Jayke one of Will Smith's kids?

    • @CriticalInsight
      @CriticalInsight 2 года назад

      I don't think so... but it is increasing in popularity! Maybe people would think I was cooler if I changed my name. www.babycenter.com/baby-names-jayke-499495.htm

  • @evandembskey8811
    @evandembskey8811 2 года назад

    Would be lovely if we could afford that 24/7 monitoring...

    • @CriticalInsight
      @CriticalInsight 2 года назад

      MDR is less expensive than most people assume. Send us an email at info@criticalinsight.com to discuss

  • @petersachs764
    @petersachs764 2 года назад

    Not a lot of specifics other than best practices. Ilo has not been on an add-in card in like two decades, it's on the motherboard.

  • @CriticalInsight
    @CriticalInsight 2 года назад

    If folks are interesting in reading more about a "Black Swan" this is a good book: www.thriftbooks.com/w/the-black-swan-the-impact-of-the-highly-improbable_nassim-nicholas-taleb/246328/#edition=5465404&idiq=4405987

  • @hifiandrew
    @hifiandrew 2 года назад

    So this is interesting. The huge Microsoft patch which addresses lots of vulnerabilities.. do not resist, except on domain controllers. One problem I discovered the hard way: it will HOSE your domain controllers. Do NOT install the latest update on your DCs. Must resist. It will apparently also screw up Hyper-V hosts too. It caused my DCs to boot up, 2 minutes later basically BSOD .. forcibly reboots. Both physical and virtual machines it happened. Thankfully I know better than to patch all DCs at once, so I still had a good one while I spent hours trying to uninstall the patch. There's a big reddit megathread in r/sysadmin. MS has only changed the status to 'investigating'. Anyway.. glad we could beta test the patches for MS. Looks like it's gonna be another month before we can patch the DCs.

  • @bok2bok333
    @bok2bok333 2 года назад

    How long could this have been exploited before detected? Does it go back to a particular patch?

    • @supervhs123
      @supervhs123 2 года назад

      We are talking about years! Its insane.

  • @SVAdAstra
    @SVAdAstra 2 года назад

    Thanks. It's going to be a wild ride!

  • @martinthormahlen6950
    @martinthormahlen6950 2 года назад

    Thank you, great overview and very good explained

  • @talha1561
    @talha1561 2 года назад

    For someone who recently moved from technical to management side it was really informative and helpful.

  • @srvazkez
    @srvazkez 2 года назад

    Amazing video Saludos From mexico

  • @webcomment8895
    @webcomment8895 2 года назад

    Sound levels are bad and unequal. One guy’s volume is so low and mumbling. When I turn up the volume so I can hear him properly, I get blasted by the sound from the second guy.

    • @CriticalInsight
      @CriticalInsight 2 года назад

      We are sorry to hear that, we'll check the sound levels for the next webinar - hope to see you there!

  • @drewedmonds7721
    @drewedmonds7721 2 года назад

    I really wish someone could refer me to a step by step guide for setting up a Windows logging server for the small shop solo sys admin types like me. With details what to log on and how long. I run 30 Windows servers. Obviously there's a wide range, of things one could log and for how long but even an example of setting a decent baseline. I have a couple spare Windows servers with lots of storage I could use for a log aggregator.

    • @CriticalInsight
      @CriticalInsight 2 года назад

      Hi Drew, thanks for asking. The “what to log” question is an interesting one, but difficult to answer for you, since we don’t know your specific application and use fo the logs. Operational and Security requirements are quite different, and we tune logging very specifically for each customer based on their usage and environment. Which brings me to my second point. Logs (even from 30 servers) are actually not that large, and a good way to start out is to over-subscribe for your logs, but make their destination something you can use to analyze the data and start making choices. One way of doing that would be to use Elasticsearch as the destination and Beats to collect the logs themselves and get them into Elasticsearch.

  • @hifiandrew
    @hifiandrew 2 года назад

    Thank you for pointing out how many consultants suck taxpayer dollars up without actually solving problems or fixing anything. They also make great scapegoats for leadership when a technology initiative fails so government loves them. Unlike a managed service, consultants don't have any stake or incentive for long term success. In my opinion, they usually get paid confiscatory amounts of money to write long-winded documents stating the obvious.

  • @carlmarx9049
    @carlmarx9049 3 года назад

    Before we go after crypto currency (I'm betting the ransom is a distraction & these are state sponsored) is ANYONE going to mention that both solar winds and Kaseya relocated r&d to Eastern Europe prior to being hacked. Russian controlled Belarus to be exact.

  • @arayter
    @arayter 3 года назад

    I hope that professor takes on the weather forecast community next

  • @roberthamilton9053
    @roberthamilton9053 3 года назад

    you two make me laugh

    • @roberthamilton9053
      @roberthamilton9053 3 года назад

      I get a little lost with the security stuff but I'm learning. the best part is the banter between Jake and my brother Mike. Their to smart for me.

  • @randystone4903
    @randystone4903 3 года назад

    Ford, Toyota, and Honda in that order. Check the mechanic Scotty on RUclips for cars that aren't a rip-off

  • @randystone4903
    @randystone4903 3 года назад

    The IP addresses sold by the Pentagon was transferred 3 minutes before Bidens inauguration. The mystery is why the "business" who received millions of the IPs has an address in the building the My Pillow guy runs. This sale was done by the newly appointed Pentagon officials Trump put into office for the biggest rip-off he's ever done worth billions.