Skip to content
Home
Services
Fractional CISO – Cybersecurity Leadership
Fractional CTO – Application Development Leadership
Automation
Ransomware Cost Estimator
Customer Success Stories
BUCS: Automation Success
ISSA Cybersecurity
Bear Analytics
Inteleos
MovementX: Automation Transformation
Resources
Publications
Papers
Newsletter
About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
Linkedin-in
Home
Services
Fractional CISO – Cybersecurity Leadership
Fractional CTO – Application Development Leadership
Automation
Ransomware Cost Estimator
Customer Success Stories
BUCS: Automation Success
ISSA Cybersecurity
Bear Analytics
Inteleos
MovementX: Automation Transformation
Resources
Publications
Papers
Newsletter
About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
Linkedin-in
Logo-cyber with three tag words 4000w
Home
Services
Fractional CISO – Cybersecurity Leadership
Fractional CTO – Application Development Leadership
Automation
Ransomware Cost Estimator
Customer Success Stories
BUCS: Automation Success
ISSA Cybersecurity
Bear Analytics
Inteleos
MovementX: Automation Transformation
Resources
Publications
Papers
Newsletter
About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
Linkedin-in

Welcome to v048 : BEC is DOA

  • June 9, 2024

Recovery: Safeguarding Data in the Face of Widespread Cyberattacks: The Importance of Isolated Recovery Environments and Immutable Cyber Data Vaults

In today’s digital landscape where cyberattacks are becoming increasingly sophisticated and prevalent, organizations must adopt a multi-layered approach to safeguard their valuable data. Two critical components of a robust data protection strategy are an isolated recovery environment and an immutable data vault. In this blog post, we will explore the necessity of utilizing both components in the event of widespread cyberattacks.

 

News: The Fundamentals of Cloud Security Stress Testing

״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them.

 

Cybercrime: FBI warns of gift card fraud ring targeting retail companies

The FBI warned retail companies in the United States that a financially motivated hacking group has been targeting employees in their gift card departments in phishing attacks since at least January 2024.

 

ChatGPT Quip &
DALL-E Image of the Week

Prompt:
Provide a bullet list of some of the worse things that could happen to an organization resulting from a business email compromise.

Response:

Business email compromise (BEC) can lead to a variety of severe consequences for an organization. Here is a bullet list of some of the worst outcomes that could result from such a compromise:

  • Financial Losses: Direct theft of funds through fraudulent transactions, such as wire transfers or invoice payments redirected to criminal accounts.
  • Data Breach: Unauthorized access to sensitive information, leading to the theft of intellectual property, personal employee information, customer data, and more.
  • Reputational Damage: Loss of trust from clients, partners, and the public, which can be especially damaging if sensitive or private information is exposed.
  •   Legal and Regulatory Penalties: Non-compliance with data protection regulations (like GDPR, HIPAA) could lead to significant fines and legal actions.
  • Operational Disruption: Interruption of business operations due to the need to respond to the breach, including investigations and remediation efforts.
  •  Loss of Business Opportunities: Erosion of client confidence and partnership opportunities due to perceived insecurity and unreliability.
  • Increased Insurance Premiums: Higher costs for cybersecurity insurance following an incident, reflecting an increased risk profile.
  • Ransomware Risk: Increased vulnerability to ransomware attacks if cybercriminals gain access to systems through compromised email accounts.
  •  Blackmail and Extortion: Potential for blackmail if sensitive or damaging information is accessed and held against the company or its executives.
  • Resource Drain: Significant allocation of resources to address the immediate aftermath of the breach and to prevent future incidents, diverting focus from core business activities.

 

News: Botnet sent millions of emails in LockBit Black ransomware campaign

Since April, millions of phishing emails have been sent through the Phorpiex botnet to conduct a large-scale LockBit Black ransomware campaign.

 

News: Low-tech tactics still top the IT security risk chart

USB-based attacks, QR codes for phishing and social engineering continue to be some of the most effective, now more dangerous with the help of AI.

 

News: It’s Time to Master the Lift & Shift: Migrating from VMware vSphere to Microsoft Azure

While cloud adoption has been top of mind for many IT professionals for nearly a decade, it’s only in recent months, with industry changes and announcements from key players, that many recognize the time to make the move is now. It may feel like a daunting task, but tools exist to help you move your virtual machines (VMs) to a public cloud provider – like Microsoft Azure – with relative ease.

 

Cybercrime: Scammers Fake Docusign Templates to Blackmail & Steal From Companies

Cybercriminals are trafficking Docusign assets that allow for easy extortion and business email compromise.

 

Cybercrime: Windows Quick Assist abused in Black Basta ransomware attacks

​Financially motivated cybercriminals abuse the Windows Quick Assist feature in social engineering attacks to deploy Black Basta ransomware payloads on victims’ networks.

 

News: New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs

A new report from XM Cyber has found – among other insights – a dramatic gap between where most organizations focus their security efforts, and where the most serious threats actually reside.

 

News: Patching vs. Isolating Vulnerabilities

Patching and updating is pretty much baked-in to the thinking, standards, and coming legislation of the device security community. Yet isolation via partitioning is another viable approach for security, and it comes with many advantages.

 

AI: User Outcry as Slack Scrapes Customer Data for AI Model Training

Slack reveals it has been training AI/ML models on customer data, including messages, files and usage information. It’s opt-in by default.

 

Cybercrime: Cybercrime ‘A Thriving Business’ as US Claims Frequency Rises

Cyber claims frequency in the United States rose 13% last year, a new report shows.

 

News: Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses

Microsoft on Monday confirmed its plans to deprecate NT LAN Manager (NTLM) in Windows 11 in the second half of the year, as it announced a slew of new security measures to harden the widely-used desktop operating system.

 

Cybercrime: Owner of Incognito dark web drugs market arrested in New York

The alleged owner and operator of Incognito Market, a dark web marketplace for selling illegal narcotics online, was arrested at the John F. Kennedy Airport in New York on May 18.

 

News: Network Threats: A Step-by-Step Attack Demonstration

Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy.

 

Vulnerability Vortex

WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim sites that are capable of harvesting credit card data.

 

A High-Severity Vulnerability Affects CISCO Firepower Management Center

Cisco addressed a SQL injection vulnerability in the web-based management interface of the Firepower Management Center (FMC) Software.

 

Hackers target Check Point VPNs to breach enterprise networks

Threat actors are targeting Check Point Remote Access VPN devices in an ongoing campaign to breach enterprise networks, the company warned in a Monday advisory.

 

CISA Alerts Federal Agencies to Patch Actively Exploited Linux Kernel Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

 

 

Read also

Welcome to V068: They let the hackers in through the ‘cloud’ – whatever that is.

Read newsletter

Welcome to V067: THIS. IS. MARCH CYBER MADNESS

Read newsletter

Welcome to v066 : Jibber Jabber Cyberwocky

Read newsletter

Welcome to v065 : Just when you thought it couldn’t get crazier…

Read newsletter

Welcome to v064: A cybersecurity pro and a business executive walk into a bar….

Read newsletter

Welcome to v063: I can remember all my passwords!

Read newsletter

Welcome to v062 : Roses are red, violets are blue, cyber-hackers are waiting for you

Read newsletter

Welcome to v061 : New Year’s Resolution: Strengthen Cybersecurity, Protect Missions.

Read newsletter

Welcome to v060 : Dashing through the net, in a cloud-based CMS

Read newsletter

Welcome to v059 : It’s Cyber Budget Time

Read newsletter

Welcome to v058 : Cyber Fright Night

Read newsletter

Welcome to v057 : Happy Cybersecurity Awareness Month!

Read newsletter

Welcome to v056 : What is your Neurocyberpathology?

Read newsletter

Welcome to v055: It’s Time to Get Cyber-tastic!

Read newsletter

Welcome to v054 : How to Phish an Association Exec

Read newsletter

Welcome to v053 : Hot Out of the Oven: American Phish Pie

Read newsletter

Welcome to v052 : Quantum Toaster Breaches: Coffee Appoints New CIO

Read newsletter

Welcome to v051: Be thankful you’re not Crowdstrike!

Read newsletter

Welcome to v050 : We’re at v050 and kicking cyber-ass!!!

Read newsletter

Welcome to v049 : Watch Over Your Tech

Read newsletter

Welcome to v047 : Insurance Future: Coverage Linked to Cyber Hygiene

Read newsletter

Welcome to v046 : One Phish, Two Phish, Red Team, Blue Team

Read newsletter

Welcome to v045 : Quantum Humor: Relatively Fun, Universally Secure

Read newsletter

Welcome to v044 : Tongue Twisting Today’s Top Tech Terms

Read newsletter

Welcome to v043 : Where Firewalls Whisper and Passwords Giggle

Read newsletter

Welcome to v042 : Swap Suits for Codes and Be Heroes

Read newsletter

Welcome to v041 : Sweet Security Insights, Slice by Slice

Read newsletter

Welcome to v040 : Staff slip, skip strict security steps

Read newsletter

Welcome to v039: Rockin’ Cyber News

Read newsletter

v038: Choose Your CyberNews

Read newsletter

v037: Cybercrime is as Cybercrime Does

Read newsletter

v036: News You Can’t Refuse

Read newsletter

v035: Have Some Views of Cyber-News

Read newsletter

v034: The Double-Edged Sword in 2024 Cybersecurity Landscape

Read newsletter

v033: Cyber News to Use so You Don’t Lose

Read newsletter

v032: Cybercrime all the time

Read newsletter

V031: Cyber News for Chews

Read newsletter

V030: Cybercrime is a Tasty Wave

Read newsletter
About Us
businessman developing strategic plans, evaluating technology

Developing cybersecurity plans, evaluating and implementing technology, building effective software, and executing strategic initiatives.

Let’s Socialize

Popular Post

Welcome to V068: They let the hackers in through the ‘cloud’ – whatever that is.

April 23, 2025

Welcome to V067: THIS. IS. MARCH CYBER MADNESS

April 3, 2025
About

Reduce cybersecurity risk, maintain compliance, develop strategic plans, and create custom software.

Services
  • Fractional CISO – Cybersecurity Leadership
  • Fractional CTO – Application Development Leadership
  • Automation
  • Ransomware Cost Estimator
Quick Links
  • Latest Publications
  • Testimonials
  • Customer Use Cases
Logo-cyber with three tag words 4000w

Do you want a free sketch for your homepage? Visit Weblify.se

Linkedin-in

Why you need a vCIO?

While CEOs and presidents grapple with the complexities of business, marketplace, industry, strategy, and their board and stakeholders, they are left with little time or inclination to deal with the details of the incredibly dynamic technology landscape. Keeping one’s eye on the myriad of technology changes and how they can and will affect the business takes a specialized, dedicated, and experienced professional. That is exactly the role of the virtual CIO or CTO.
Download

20 Years of CIO Experience

Tracks trends, market direction and customer needs to plan the future of technology.  Recruits high performing team members and develops their skills by providing decision-making ownership and collaborative engagement.  Able to initiate culture change, lead by example, and get buy-in at all levels.  Known for facilitating energizing brainstorming sessions that generate actionable insights and create new revenue opportunities.

In 2000, Brian was introduced to the exhibitions and events industry when he joined 3rd Millennium Communications as Manager of Software Development for a Virtual Tradeshow Product.  That company was acquired by Galaxy Information Services and through additional acquisitions later became Experient.

As CIO of Experient, Brian oversaw the replacement and upgrade of every piece of legacy proprietary systems that supported the registration, housing, and lead retrieval services.  He also oversaw the transition from a paper-based and manual business operations to an entirely online and mobile app-based model.  Brian oversaw the strategy and operations of the Experient data center including their recent adoption and migration to cloud-based hosting to enhance availability, reliability, scalability, and recoverability.

Brian led the product development strategy and spearheaded several product concepts including eventBit™ which was granted a US patent in 2019 (Patent Number: US 10,311,267 B2).  He was also instrumental in the evolution of lead retrieval products from hardware-based units to smart phone-based mobile app technology.

Brian oversaw the cyber-security position for Experient including compliance to the Payment Card Industry Data Security Standard (PCI DSS), SSAE-18 SOC 1 Type II, and internal corporate security standards audits. Security scope included a 400-server data center, 700 end user devices, and credit card data environment, and a data center holding thousands of databases of customer data. Under Brian’s leadership, Experient successfully met or exceeded requirements for PCI since its introduction in 2005.

Brian’s business philosophy is rooted in a belief in the power of high performing teams, the necessity of self-disruption, the focus on the client’s perspective, the criticality of speed of change, and the utility of lean and agile development and operational processes.

Brian has the honor of being the first technology professional to participate as a director on the Board of Directors for the International Association of Exhibitions and Events® (IAEE). Organized in 1928 as the National Association of Exposition Managers to represent the interests of trade show and exposition managers, the International Association of Exhibitions and Events® is the leading association for the global exhibition industry. Today IAEE represents over 12,000 individuals in 50 countries who conduct and support exhibitions around the world. Being a data-centric leader, Brian is also proud to serve on the board of CEIR, the Center for Exhibition Industry Research.

Brian also believes that in today’s competitive employee market, the most successful companies must find ways to create enjoyable and engaged workplace environments. No stranger to performance, Brian was frequently seen on stage in front of the Experient organization delivering educational messages (such as not clicking on links within phishing emails) or just poking fun at his peers within the leadership team through music.

Brian is a Tennessee Volunteer at heart and his blood runs deep orange due to his undergraduate studies at the University of Tennessee, Knoxville where he received his Bachelors of Science in Electrical Engineering with Honors.  He also earned a Masters of Science in Technology Management from the University of Maryland Global Campus.  His personal passions include his wife and two sons, music, and fitness.  He is a 30-year veteran of live music performance, a published musical play composer, and a recording studio engineer and producer.  When he’s not in the studio, you’ll find him out on his bike climbing the local hills.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.I agree