Critical Insight
Critical Insight
  • 297
  • 65 187

Video

Unmasking the Tactics of Cybercriminals Targeting Your Business
zhlédnutí 210Před 7 hodinami
Over 43% of cyberattacks target small businesses, and of those, 60% will close within six months of being breached due to the financial and reputational damage caused. - Verizon Business In the evolving landscape of cybersecurity threats, businesses of all sizes are increasingly vulnerable to sophisticated attacks. This webinar dives deep into the most pressing security challenges: credential s...
Fortifying Healthcare IT: Strategies to Protect Your Organization from Rising Class Action Lawsuits
zhlédnutí 41Před měsícem
Unauthorized disclosure of protected information is bad enough - the dreaded ‘records breach’. But today, because of privacy statutes in California and elsewhere, records disclosure is quickly followed by class action lawsuits. This does not have a deterrent effect, and as the healthcare sector is preferentially targeted for extortion, a situation is developing where we are suing our own hospit...
Strategies for Managing Third Party Risks in the Public Sector
zhlédnutí 55Před měsícem
State, local, Tribal, and territorial governments have unique challenges when it comes to managing third-party and supply chain risk. A lack of real regulatory requirements, increasing dependence on vendors, and threats capitalizing on third party vulnerabilities to reach “downstream” targets are at an all-time high. Join us for a panel discussion where our experts will discuss the history of s...
Enhancing Water Sector Security - Whether Regulated or Not
zhlédnutí 45Před 2 měsíci
Vulnerabilities in our critical infrastructure are increasingly under the spotlight. Recent cyber-attacks have highlighted the urgent need for enhanced security measures and response plans. Regulatory changes have been attempted in the water sector and have been unsuccessful. And given the Supreme Court's recent Chevron decision, regulatory oversight for all critical sectors is now in question....
Urgent Panel Webinar: How to Handle the Kaspersky Ban
zhlédnutí 114Před 2 měsíci
If you’re using Kaspersky - now is the time to vet new solutions and switch providers. The U.S. Department of Commerce’s Bureau of Industry and Security (BIS) has issued a Final Determination banning the sale of Kaspersky products and services in the country starting July 20, 2024, due to national security concerns. Furthermore, Kaspersky will be prohibited from providing software updates and m...
Credential Abuse: Why, How, and What You Can Do About It
zhlédnutí 36Před 2 měsíci
Credential Abuse: Why, How, and What You Can Do About It
What ChatGPT Won't Tell You About Virtual Chief Information Security Officers (vCISO)
zhlédnutí 70Před 3 měsíci
Curious about what a virtual Chief Information Security Officer (vCISO) really does? While basic answers are easy to find, they often lack depth and accuracy, leaving you with a skewed understanding of this vital role. This insightful webinar is designed for those who want to cut through the noise and get straight to the heart of how hiring an external cybersecurity expert can transform your op...
Urgent Panel Discussion: Healthcare Ransomware - Are You Negligent or a Victim?
zhlédnutí 109Před 3 měsíci
Ascension Healthcare and Change Healthcare's recent ransomware attacks highlight the severe consequences healthcare organizations face, including massive financial losses and compromised patient safety. Join our urgent panel as we analyze these attacks, dissect potential liabilities, and provide actionable insights to bolster your defenses against the rising cyberthreats in healthcare. Key Take...
The New CIRCIA Reporting Requirements for Critical Infrastructure
zhlédnutí 110Před 4 měsíci
The New CIRCIA Reporting Requirements for Critical Infrastructure
Cyber Insurance Changes: A 2024 update on getting the right cyber insurance
zhlédnutí 213Před 5 měsíci
Cyber Insurance Changes: A 2024 update on getting the right cyber insurance
Urgent Panel: Change Healthcare Cyberattack Implications
zhlédnutí 593Před 6 měsíci
Urgent Panel: Change Healthcare Cyberattack Implications
Implications of the HHS Cybersecurity Performance Goals (CPGs): Did the government go far enough?
zhlédnutí 86Před 6 měsíci
Implications of the HHS Cybersecurity Performance Goals (CPGs): Did the government go far enough?
How to Measure and Reduce Your Cybersecurity Risk
zhlédnutí 118Před 7 měsíci
How to Measure and Reduce Your Cybersecurity Risk
Urgent Panel: Ransomware Criminals Targeting Patients and Parents in Upward Trend
zhlédnutí 111Před 7 měsíci
Urgent Panel: Ransomware Criminals Targeting Patients and Parents in Upward Trend
Critical Insight New MDR Capabilities and New Risk Platform
zhlédnutí 136Před 9 měsíci
Critical Insight New MDR Capabilities and New Risk Platform
Mike Hamilton's 2024 Cybersecurity Predictions
zhlédnutí 91Před 9 měsíci
Mike Hamilton's 2024 Cybersecurity Predictions
Critical Insight MXDR SOC Portal Demo
zhlédnutí 43Před 9 měsíci
Critical Insight MXDR SOC Portal Demo
How to (and How NOT to) Human-Proof Your Cybersecurity Strategy
zhlédnutí 87Před 9 měsíci
How to (and How NOT to) Human-Proof Your Cybersecurity Strategy
Urgent Panel Discussion: Legal Trouble and Claims of Negligence
zhlédnutí 58Před 10 měsíci
Urgent Panel Discussion: Legal Trouble and Claims of Negligence
Critical Insight GRC Platform Demo
zhlédnutí 50Před 10 měsíci
Critical Insight GRC Platform Demo
How to Build a Communication Plan for a Ransomware Attack
zhlédnutí 131Před 10 měsíci
How to Build a Communication Plan for a Ransomware Attack
Building Your Security Program with Federal Grant Funding - Washington State - ACCIS Fall Conference
zhlédnutí 32Před 10 měsíci
Building Your Security Program with Federal Grant Funding - Washington State - ACCIS Fall Conference
AI in InfoSec: What's Hype and What's Real
zhlédnutí 132Před 11 měsíci
AI in InfoSec: What's Hype and What's Real
Urgent Panel Discussion: MGM and Caesars Cyberattack
zhlédnutí 324Před 11 měsíci
Urgent Panel Discussion: MGM and Caesars Cyberattack
The SEC 4-Day Cyber Disclosure Rule: What It Means For You
zhlédnutí 46Před rokem
The SEC 4-Day Cyber Disclosure Rule: What It Means For You
What Drives Threat Actors
zhlédnutí 64Před rokem
What Drives Threat Actors
Healthcare Data Breach Trends In The First Half Of 2023
zhlédnutí 160Před rokem
Healthcare Data Breach Trends In The First Half Of 2023
5 Common, Avoidable Mistakes Companies Make in Security Programs
zhlédnutí 103Před rokem
5 Common, Avoidable Mistakes Companies Make in Security Programs
Not All "Penetration Tests" Are Actual Penetration Tests
zhlédnutí 99Před rokem
Not All "Penetration Tests" Are Actual Penetration Tests

Komentáře

  • @jnglgurl21
    @jnglgurl21 Před 12 hodinami

    Thank you. This was very helpful!!

  • @seattlemkh
    @seattlemkh Před dnem

    This was a good one!

  • @MISTYEYED.
    @MISTYEYED. Před 2 dny

    Thank you.

  • @desertjeeper
    @desertjeeper Před 3 dny

    Thanks to everyone who attended and took something away from this webinar!

  • @comosaycomosah
    @comosaycomosah Před 2 měsíci

    been seeing a ton of water treatment plant attacks lately...ps this panel is stacked!

  • @leslieya9787
    @leslieya9787 Před 3 měsíci

    Would it be best to consult (provide implementation services) first before becoming as assessor?

  • @mahmoudshoaala
    @mahmoudshoaala Před 4 měsíci

    Where is the slide, please?

  • @Susieq26754
    @Susieq26754 Před 6 měsíci

    United Healthcare has 490 billion invested. Why? Who is really involved? Poor and middle class people aren't getting it. That's for sure.

  • @desertjeeper
    @desertjeeper Před 8 měsíci

    Love the festive kraken Jake!

  • @JudeGaspardRX
    @JudeGaspardRX Před 9 měsíci

    Hi, awesome content. Thank you. What platform did you use for the video?

  • @hackmasterHQ
    @hackmasterHQ Před 10 měsíci

    Thank you! This was very helpful. I have an interview for a job that provides SOCaaS.

  • @Kai_1344
    @Kai_1344 Před rokem

    Surprised that this channel isn't more popular. Thank you for yet another good video.

  • @hifiandrew
    @hifiandrew Před rokem

    Targarian AI FTW

  • @arvindbega4762
    @arvindbega4762 Před rokem

    Promo SM 😌

  • @danielbaker4595
    @danielbaker4595 Před rokem

    possible to get the link to the excel sheet Michael shared?

    • @CriticalInsight
      @CriticalInsight Před rokem

      hey there - shoot us an email if you haven't already and we'll do it! info@criticalinsight.com

  • @user-gi3jd8pt8f
    @user-gi3jd8pt8f Před rokem

    Big thanks! Once again, the CI team pulls together to help us all stay informed with sage advice and knowledge. As stated, this is not the end of this threat. Be vigilant.

  • @PS-pr5ch
    @PS-pr5ch Před rokem

    Great discussion! Listened live

  • @paulsonmichael3293
    @paulsonmichael3293 Před rokem

    Hi, I want to get trained for and sit the CMMC certification exams. Please, how do I go about it?

  • @PS-pr5ch
    @PS-pr5ch Před rokem

    Great webcast!

  • @roncollins1046
    @roncollins1046 Před rokem

    I figure how you two pay for your leafy lifestyles must have something to do with government grants, which of course do not require any actual services rendered or results delivered, only documentary fiction meant to make it appear as though you were ever qualified or equipped to produce anything other than a completed grant application. Nice un-work if you can get it; or it must be, since plenty of hot-air peddlers of your variety are riding that particular gravy train. (And I know you got my other messages, and have a pretty solid hypothesis on why you refuse to act on them.)

  • @Moxie3d-o6s
    @Moxie3d-o6s Před rokem

    interesting topics, ty guys

  • @debrawatts2172
    @debrawatts2172 Před rokem

    Will there be a cap on the # of CCA & CCPs?

    • @debrawatts2172
      @debrawatts2172 Před rokem

      BTW DFARS is Defense Federal Acquisiton REGULATION Supplement.

  • @jaymartin2625
    @jaymartin2625 Před rokem

    Thanks guys

  • @arayter
    @arayter Před rokem

    Mike was on fire as usual!

  • @cliffkahn
    @cliffkahn Před rokem

    To be fair, Mike had a pretty good kicker last week. The one about the privacy institute

  • @humayoonpopal846
    @humayoonpopal846 Před rokem

    Hello there world, I started the course online today and we will be digging into it as of Thursday. I can use any help if you don’t mind sharing

  • @mithoofarizi5538
    @mithoofarizi5538 Před rokem

    very important content.

  • @thispleasesbulba
    @thispleasesbulba Před rokem

    Excellent talk

  • @ianrobinson9802
    @ianrobinson9802 Před 2 lety

    Star Trek Lower Decks for me 😊

  • @roncollins1046
    @roncollins1046 Před 2 lety

    Once the entire human experience had been turned over giddily and thoughtlessly to a vast mechanism of printed circuits without which ordinary human life is now regarded as inconceivable, this made it inevitable that continual threats to America's IT systems from multiple actors would by 2022, with a war on and all, be an easy selling point for continual and expanding federal intervention in order to protect them. And, by all appearances thus far, the rights of the people be damned.

  • @roberthamilton9053
    @roberthamilton9053 Před 2 lety

    Mike going to country music? What the heck! The rest of critical insight was good stuff.

  • @roncollins1046
    @roncollins1046 Před 2 lety

    As a survivor of the 20th century and the complete abandonment of an entire analog way of life which was overrun within a single generation by all this IT gimmickry, it appears to me that the potential for an analog component to the question of cybersecurity tends to be ignored. The overall purpose of any security for any enterprise is to protect that enterprise as a whole, whereas it looks like the cybersecurity philosophy limits itself to questions of whether the IT is secure or vulnerable or under attack, but does this obscure the potential for leaks and vulnerabilities themselves having nothing at all to do with the integrity of an IT system? As an example, here in Oklahoma, both State and local officials conduct official business on private cell phones so routinely that the bureaucracies' only answer to this behavior is 'it's fine, we do it all the time.' And in what amounts to a party-state run by the OKGOP establishment without appreciable opposition at any level, all the negligence and complacency and personal opportunism you might expect out of any party-state are plainly in evidence here. The official world here seems to take on faith (!) its own infallibility and invincibility, and upholds this posture as an official persona, there is a 'perfectly reasonable explanation' for everything, and the State is never, ever in the wrong, according to the State. Meanwhile, its IT systems leak like sieves, but the holes are not in the systems themselves, but rather the lax and self-assured attitudes of official employees who barely even have any concept of any kind of threat if it is not a direct threat on their own lifestyles and suppositions. If a potential issue raised by the citizenry does not appear to be a threat to the monopoly on power or the careers of particular officials, then that issue is simply ignored. Oklahomans are very, very skilled at changing the subject or just ignoring someone when what they say is not what someone wants to hear; it runs in the very fabric of how life is lived here. Folks apparently believe this is good manners. Oklahoma's vulnerabilities to 21st century threats are exacerbated by its apparent indifference to the prospect of actually joining the 21st century, beyond an infantile attraction to every new gimmick that comes on the market. But the only way this vulnerability is ever going to be proven to these dunderheads is when someone or some thing actually renders catastrophic damage to its government's systems. At which point the feds will take over, call it 'national security', and the Tenth Amendment is a thing of the past along with the rest of the rapidly-vanishing Bill of Rights. Maybe Oklahoma's government should just turn some of these toys off for good, while they still can.

  • @WAGISDev
    @WAGISDev Před 2 lety

    Bjorn! Way to go calling out having to being able to understand the IT and Industrial system itself. I passed this video over to my former employer.

  • @roncollins1046
    @roncollins1046 Před 2 lety

    Yet another example of the federal establishment's continual long-term quest to eliminate 10th Amendment local self-governance outright, by funding and task-forcing State authorities into 'compliance' with ever-expanding federal requirements which essentially reduce State sovereignty to a kind of obedient provincialism. Current circumstances in eastern Europe (etc) continue to provide ready rationales for a federal posture of permanent emergency, which serves as an adaptable template for the engineering of endless federal incursions into State and local law enforcement, jurisprudence and regulatory application: the old catchall of 'national security' being stretched ever further to eventually include every detail of every American life's being regarded as potential evidence, merely awaiting appropriate casework to plug it into. Programmatic justice on a nationwide scale, flying first in the face of, and eventually out of the reach of, any residual notion of constitutional civil liberties, has long been the primary objective of the bloated and permanently entrenched federal establishment. None of this epic crusade toward eventual total DC hegemony over every aspect of American life has ever had anything to do with partisan politics or factional alignments. The DC regime is a faction unto itself, geared primarily toward the eventual aim of being a law unto itself, and being the only law there is. States do business with the DC machine at their extreme peril: any asset, program, budget or work force a State might regard as its own affair to govern can be and in time will be over-run by this strategy of fund-then-hijack which the DC executive branch has used, for generations, to reduce State governing powers to federal policy implementations required of DC's subordinate provinces, irrespective of the electoral or legislative preferences exhibited within any State. 'Cybersecurity' is just the latest in a long series of jingles deployed, in order to soften the countenance of what amount to, again and again and again, federal-executive Enabling Acts designed to erode civil liberties still further, in order to remove them as obstacles to continued expansion of programmatic DC powers. In the case of the matter at hand, the State of Oklahoma's prosecution service, its District Attorneys Council, may labor under an illusion for the time being of having its own way with all these networked surveillance systems it now aims at random citizens for its own murky ends; but in coming weeks and months may discover that the USDOJ and other federal entities may have uses of their own for all this DAC/UVED spy equipment, and perhaps even more so for all the data already generated and stored over the more than three years' time the program has been up and running. In short, when I applied for a driver's license in Oklahoma, I never signed some agreement that any information the State might manage to gather about my personal movements, by any means it has in its capabilities, might one day become part of some vast collection of personal, federal, dossiers kept on the citizenry in general. So I stopped driving automobiles altogether. The State has made the activity untenable for me with its experimental surveillance project, and may well end up being compelled for grant funding's sake to turn over every bit of intelligence it has gathered on me to some federal 'task force.' If this program is not shut down immediately, it is only a matter of time before it becomes just another outpost of federal surveillance powers, to be used for any purpose at any time in the future. How any of this careless playtoy foolishness, of pointing cameras at passersby and then seeking to extort them, was ever meant to serve or protect Oklahoma, escapes me. But what all this data thus generated, for no good or legally defensible reason in the least, might come to be used for in the future, and by whom, is a matter of conscience and civic duty right now, to all those who have enabled this UVED program, and all those who continue to allow it to operate.

  • @hifiandrew
    @hifiandrew Před 2 lety

    Always enjoy the weekly updates. One suggestion, could you please get rid of the old CI Security youtube channel? I always end up on that wrong channel when looking for this one. :)

    • @CriticalInsight
      @CriticalInsight Před 2 lety

      Thanks Drew - we love the feedback and its always great to hear from you. We found that old channel earlier and its shut down now, thanks for the reminder! ^Dave

  • @SaadMehboob84
    @SaadMehboob84 Před 2 lety

    Hi, during the webinar . You mentioned the DOD CIO has mentioned that every one holding CUI at level 2 will undergo third party assessment. This is different from what I previously understand where only some vendors holding critical CUI at level 2 will undergo C3PAO assessment. Could you provide me link to where DOD CIO have mentioned this. Thanks

    • @CriticalInsight
      @CriticalInsight Před 2 lety

      Thank you for asking - certainly - you can find it here: federalnewsnetwork.com/cybersecurity/2022/02/more-companies-may-have-to-get-a-cmmc-assessment-after-all/

  • @bok2bok333
    @bok2bok333 Před 2 lety

    Very interesting thanks.

    • @CriticalInsight
      @CriticalInsight Před 2 lety

      Thanks! We always appreciate feedback (especially positive feedback!).

  • @zenriding1249
    @zenriding1249 Před 2 lety

    Isn't Jayke one of Will Smith's kids?

    • @CriticalInsight
      @CriticalInsight Před 2 lety

      I don't think so... but it is increasing in popularity! Maybe people would think I was cooler if I changed my name. www.babycenter.com/baby-names-jayke-499495.htm

  • @evandembskey8811
    @evandembskey8811 Před 2 lety

    Would be lovely if we could afford that 24/7 monitoring...

    • @CriticalInsight
      @CriticalInsight Před 2 lety

      MDR is less expensive than most people assume. Send us an email at info@criticalinsight.com to discuss

  • @petersachs764
    @petersachs764 Před 2 lety

    Not a lot of specifics other than best practices. Ilo has not been on an add-in card in like two decades, it's on the motherboard.

  • @CriticalInsight
    @CriticalInsight Před 2 lety

    If folks are interesting in reading more about a "Black Swan" this is a good book: www.thriftbooks.com/w/the-black-swan-the-impact-of-the-highly-improbable_nassim-nicholas-taleb/246328/#edition=5465404&idiq=4405987

  • @hifiandrew
    @hifiandrew Před 2 lety

    So this is interesting. The huge Microsoft patch which addresses lots of vulnerabilities.. do not resist, except on domain controllers. One problem I discovered the hard way: it will HOSE your domain controllers. Do NOT install the latest update on your DCs. Must resist. It will apparently also screw up Hyper-V hosts too. It caused my DCs to boot up, 2 minutes later basically BSOD .. forcibly reboots. Both physical and virtual machines it happened. Thankfully I know better than to patch all DCs at once, so I still had a good one while I spent hours trying to uninstall the patch. There's a big reddit megathread in r/sysadmin. MS has only changed the status to 'investigating'. Anyway.. glad we could beta test the patches for MS. Looks like it's gonna be another month before we can patch the DCs.

  • @bok2bok333
    @bok2bok333 Před 2 lety

    How long could this have been exploited before detected? Does it go back to a particular patch?

    • @supervhs123
      @supervhs123 Před 2 lety

      We are talking about years! Its insane.

  • @SVAdAstra
    @SVAdAstra Před 2 lety

    Thanks. It's going to be a wild ride!

  • @martinthormahlen6950
    @martinthormahlen6950 Před 2 lety

    Thank you, great overview and very good explained

  • @talha1561
    @talha1561 Před 2 lety

    For someone who recently moved from technical to management side it was really informative and helpful.

  • @srvazkez
    @srvazkez Před 2 lety

    Amazing video Saludos From mexico

  • @webcomment8895
    @webcomment8895 Před 3 lety

    Sound levels are bad and unequal. One guy’s volume is so low and mumbling. When I turn up the volume so I can hear him properly, I get blasted by the sound from the second guy.

    • @CriticalInsight
      @CriticalInsight Před 3 lety

      We are sorry to hear that, we'll check the sound levels for the next webinar - hope to see you there!

  • @drewedmonds7721
    @drewedmonds7721 Před 3 lety

    I really wish someone could refer me to a step by step guide for setting up a Windows logging server for the small shop solo sys admin types like me. With details what to log on and how long. I run 30 Windows servers. Obviously there's a wide range, of things one could log and for how long but even an example of setting a decent baseline. I have a couple spare Windows servers with lots of storage I could use for a log aggregator.

    • @CriticalInsight
      @CriticalInsight Před 3 lety

      Hi Drew, thanks for asking. The “what to log” question is an interesting one, but difficult to answer for you, since we don’t know your specific application and use fo the logs. Operational and Security requirements are quite different, and we tune logging very specifically for each customer based on their usage and environment. Which brings me to my second point. Logs (even from 30 servers) are actually not that large, and a good way to start out is to over-subscribe for your logs, but make their destination something you can use to analyze the data and start making choices. One way of doing that would be to use Elasticsearch as the destination and Beats to collect the logs themselves and get them into Elasticsearch.

  • @hifiandrew
    @hifiandrew Před 3 lety

    Thank you for pointing out how many consultants suck taxpayer dollars up without actually solving problems or fixing anything. They also make great scapegoats for leadership when a technology initiative fails so government loves them. Unlike a managed service, consultants don't have any stake or incentive for long term success. In my opinion, they usually get paid confiscatory amounts of money to write long-winded documents stating the obvious.