Will Oram

@willoram

Help companies respond to cyber security breaches | previously national security | cyber, foreign policy, crisis response and the environment

London
Vrijeme pridruživanja: siječanj 2015.

Tweetovi

Blokirali ste korisnika/cu @willoram

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @willoram

  1. Prikvačeni tweet
    8. sij

    With rising geopolitical tensions and the alert on the potential for a cyber response to recent global events, we've written a blog on how organisations can respond by rapidly mobilising activities to reduce cyber risk

    Poništi
  2. 2. velj

    Can’t blame people for being confused

    Poništi
  3. proslijedio/la je Tweet

    This is a really good thread from Will at PWC - worth a read outside context of Iran too.

    Poništi
  4. proslijedio/la je Tweet
    7. sij

    Ah yes, Travelex and the curse of unpatched critical Pulse VPN vulns leading to a major incident. People ask "why is patching so hard for orgs?" I work for a large UK hospitality org. We run Pulse Secure VPN. It took ages to sort patching out & I'll explain why, so thread..

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    7. sij

    CONFIRMED: Travelex is being held to ransom by hackers. Cyber criminals are holding the firm to ransom as all systems are down. Cashiers forced to use pen and paper. across thousands of sites. Met police leading investigation.

    Prikaži ovu nit
    Poništi
  6. 6. sij

    13/ Get in touch if you want to chat more about how to get this off the ground, gain support and build momentum - more than happy to chat

    Prikaži ovu nit
    Poništi
  7. 6. sij

    12/ Also whilst not strictly related, this deserves it’s own tweet: make sure you have deployed multi-factor authentication on all your externally accessible services (this is achievable even in large orgs in < 90 days by mobilising significant resources)

    Prikaži ovu nit
    Poništi
  8. 6. sij

    11/ protect domain admin accounts; lock down accounts in local admin groups and set strong passwords on default local admin accounts; set strong passwords on service accounts; patch internal RCE vulnerabilities; uplift detection and response capabilities (try EDR); test backups

    Prikaži ovu nit
    Poništi
  9. 6. sij

    10/ Key areas of focus - prevent malicious payloads being delivered via phishing; restrict what can be executed on endpoints (inc. scripts); upgrade endpoints to Windows 10 and use built-in security features; segment endpoints away from the corporate network

    Prikaži ovu nit
    Poništi
  10. 6. sij

    9/ Worth having a look at some of the cool Emotet honeypot work is doing - some great insights here; map out the kill chains of these attacks (with MITRE ATT&CK) and work out the key controls you can apply at each stage to prevent and detect an attackers actions

    Prikaži ovu nit
    Poništi
  11. 6. sij

    8/ Where to start? focus on the basics: make it more difficult for an attacker to phish an employee, run malware on a workation, gain administrator privileges and get the access required to move laterally around your environment

    Prikaži ovu nit
    Poništi
  12. 6. sij

    7/ How can you make an impact both against state-sponsored attacks and Emotet? There is currently a significant convergence between the tools and techniques of cyber crime groups, red teams and many state sponsored attackers - this is a great opportunity to exploit this

    Prikaži ovu nit
    Poništi
  13. 6. sij

    6/ Why do this now? Recent examples show that it is only a matter of time before ransomware will cripple your business if you haven’t implemented fundamental security controls. Implementing these controls are challenging but achievable

    Prikaži ovu nit
    Poništi
  14. 6. sij

    5/ Get senior leadership buy-in to drive rapid change in the IT environment; get a Red Team to work collaboratively with you to help you identify vulnerabilities, validate these have fixed these and demonstrate the impact you are making

    Prikaži ovu nit
    Poništi
  15. 6. sij

    4/ Build an action plan of what you can achieve over the next 30/60/90 days; focus on tasks which will have a direct impact on rapidly reducing risk and increasing difficulty to an attacker; execute at pace with sprints, ensure accountability, be open to changing plans

    Prikaži ovu nit
    Poništi
  16. 6. sij

    3/ How could you do this? Use recent examples of catastrophic ransomware attacks to tell a story to senior leadership justifying the urgency of improving security now; pull together a team of your best people from your security and IT teams; get a whiteboard and people in a room;

    Prikaži ovu nit
    Poništi
  17. 6. sij

    2/ A security improvement programme focused on defending against Emotet, with only 3-6 months of sustained effort could significantly improve your company's ability to defend against destructive ransomware attacks and more sophisticated attacks

    Prikaži ovu nit
    Poništi
  18. 6. sij

    1/ If you are walking into work today worried about how to defend against the cyber threat posed by Iran, ‘s tweet still holds as true as ever: focus on defending against Emotet and the ransomware attacks being launched from it

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    5. sij

    Trump now on the golf course; his 257th day at a Trump golf club and 338th at a Trump property since taking office in January 2017

    Poništi
  20. proslijedio/la je Tweet
    5. sij

    Another facet of the Iranian cyberthreat is the cyberattack (disruptive/destructive) capability posed by Iran. Will they cripple our society? I highly doubt it. Could they score some major blows against individual companies and maybe even the US sense of security? Absolutely. 5/x

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·