01.02.2024 Views

The Cyber Defense eMagazine February Edition for 2024

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

disclose material cybersecurity incidents within four days of determining materiality. Additionally, the<br />

Department of Justice’s (DOJ) Civil <strong>Cyber</strong>-Fraud Initiative will allow cases of fraud related to<br />

organizational misrepresentation of cybersecurity capabilities to be pursued. <strong>The</strong> DOJ has already taken<br />

action against a number of organizations, such as a recent settlement with Verizon that resulted in a $4<br />

million fine.<br />

So, how does a CISO ensure that the organization is continually meeting compliance obligations and<br />

using due care with respect to cybersecurity strategy, controls, and outcomes? A key capability to<br />

consider is the implementation of a system of record. A system of record establishes an authoritative<br />

source of truth about the organization’s cybersecurity program that helps leadership understand the<br />

cybersecurity posture of the organization, align cybersecurity investments with strategic objectives, and<br />

meet regulatory obligations. A system of record may include the results of security and risk assessments,<br />

metrics related to security controls, status of planned and in-progress improvement activities, and an<br />

understanding of the potential impact of threats.<br />

CMMC requires defense contractors to provide an annual affirmation that the organization is maintaining<br />

compliance with the security requirements. A system of record will provide a CISO and other senior<br />

officials with the necessary support and justification to affirm compliance in good faith. Additionally, a<br />

system of record can help the organization justify that cybersecurity decisions were made based on sound<br />

rationale and best available in<strong>for</strong>mation. This can be particularly useful post-breach if the organization<br />

needs to answer to regulators, the government, customers, and other stakeholders.<br />

Access to advanced attack techniques, even by less sophisticated threat actors, is driving increased<br />

scrutiny of cybersecurity measures. It is paramount that organizations carefully review their cybersecurity<br />

capabilities—regardless of maturity level—and evaluate if they will be durable when tested. Beyond<br />

adopting new security requirements, organizations should place the development of a per<strong>for</strong>mance<br />

management program high on their list of program improvements. Establishing and monitoring metrics is<br />

critical to ensure security controls are per<strong>for</strong>ming adequately, to protect the organization, and to validate<br />

compliance with regulations, like CMMC. Coupled with a system of record, organizations can more<br />

effectively prove that they have not only achieved and maintained compliance, but have done so with<br />

appropriate due care. Compliance without cybersecurity per<strong>for</strong>mance monitoring and improvement is a<br />

poor organizational investment.<br />

About the Authors<br />

Richard Caralli is a senior cybersecurity advisor at Axio with<br />

significant executive-level experience in developing and leading<br />

cybersecurity and in<strong>for</strong>mation technology organizations in<br />

academia, government, and industry. Caralli has 17 years of<br />

leadership experience in internal audit, cybersecurity, and IT in the<br />

natural gas industry, retiring in 2020 as the Senior Director –<br />

<strong>Cyber</strong>security at EQT/Equitrans. Previously, Caralli was the Technical Director of the Risk and Resilience<br />

program at Carnegie Mellon's Software Engineering Institute CERT Program, where he was the lead<br />

researcher and author of the CERT Resilience Management Model (CERT-RMM), providing a foundation<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2024</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!